Last Day to Save $350 on 4-6 Day Cyber Security Courses at SANS Network Security in Las Vegas!

Cyber Defense Initiative® 2016

Washington, DC | Sat, Dec 10 - Sat, Dec 17, 2016
This event is over,
but there are more training opportunities.

Course
Dec
Sa 10Su 11Mo 12Tu 13We 14Th 15Fr 16Sa 17
NewSEC567: Social Engineering for Penetration Testers
Instructor: Dave Shackleford
      
NewFOR578: Cyber Threat Intelligence
Instructor: Jake Williams
   
NewICS456: Essentials for NERC Critical Infrastructure Protection
Instructor: Tim Conway
   
NewHST: Physical Access Control Systems: Elements of Design, Offense, and Defense
Instructor: The CORE Group
      
SEC401: Security Essentials Bootcamp Style
Instructor: Bryan Simon
  
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Instructor: John Strand
  
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Michael Murr
  
FOR408: Windows Forensic Analysis
Instructor: Ovie Carroll
  
SEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Eric Conrad
  
WaitlistSEC503: Intrusion Detection In-Depth
Instructor: Mike Poor
  
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
   
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
  
WaitlistMGT414: SANS Training Program for CISSP® Certification
Instructor: David R. Miller
  
FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting
Instructor: Chad Tilbury
  
WaitlistSEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: Tim Medin
  
SEC505: Securing Windows and PowerShell Automation
Instructor: Jason Fossen
  
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: Clay Risenhoover
  
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
  
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
   
WaitlistSEC575: Mobile Device Security and Ethical Hacking  
WaitlistSEC301: Intro to Information Security
Instructor: Keith Palmgren
   
WaitlistDEV522: Defending Web Applications Security Essentials  
AUD440: Critical Security Controls: Planning, Implementing, and Auditing
Instructor: Randy Marchany
      
MGT514: IT Security Strategic Planning, Policy, and Leadership
Instructor: Frank Kim
   
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
      
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Bryce Galbraith
      
WaitlistSEC511: Continuous Monitoring and Security Operations  
SEC550: Active Defense, Offensive Countermeasures and Cyber Deception
Instructor: Bryce Galbraith
   
SEC760: Advanced Exploit Development for Penetration Testers
Instructor: Stephen Sims
  
WaitlistFOR518: Mac Forensic Analysis
Instructor: Sarah Edwards
  
WaitlistFOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
Instructor: Philip Hagen
  
MGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
      
WaitlistDEV534: Secure DevOps: A Practical Introduction
Instructors: Ben Allen, Frank Kim
      
ICS515: ICS Active Defense and Incident Response
Instructor: Robert M. Lee
   
HOSTED: Health Care Security Essentials
Instructor: Greg Porter
      
Sold OutCore NetWars Experience
Instructor: Jeff McJunkin
      
WaitlistDFIR NetWars Tournament      
(CS)2AI Special Event: Control System Cyber Security Association International
Instructor: Derek Harp and Mike Assante
Analysis of the Cyber Attack on the Ukrainian Power Grid
Instructor: Robert M. Lee
CISSP - How to Get the Certification that Matters the Most
Instructor: David R. Miller
Collecting Windows Installed Software Details
Instructor: Jonathan Risto
Current and Future Trends in Digital Investigative Analysis
Instructor: Ovie Carroll
DLP FAIL!!! Using Encoding, Steganography, and Covert Channels to Evade DLP and Other Critical Controls
Instructor: Kevin Fiscus
General Session - Welcome to SANS
Instructor: Bryan Simon
Gh0st in the Dshell: Decoding Undocumented Protocols
Instructor: David Martin
GIAC Program Presentation
Instructor: Scott Cassity
Maintaining a Digital Evidence Program in an Ever-Changing Environment
Instructor: Charles Mallery
NetWars Tournament of Champions
Instructor: Hosted by Jeff McJunkin
Open-Source Intelligence (OSINT) Tips for Malware Investigations
Instructor: Lenny Zeltser
Portable NFAT Tools, Techniques, and System Build
Instructor: Don Murdoch
Prioritizing Your Security Program
Instructor: Keith Palmgren
Quality not Quantity: Continuous Monitoring's Deadliest Events
Instructor: Eric Conrad
Securing Your Kids
Instructor: Lance Spitzner
Security Awareness: Understanding and Managing Your Top Seven Human Risks
Instructor: Lance Spitzner
The iOS of Sauron - How iOS Tracks Everything You Do
Instructor: Sarah Edwards
The Tap House
Instructor: Philip Hagen
Trustworthiness with Cyber-Physical Systems (CPS)
Instructor: Paul Shaw & Chris Newborn
Using Splunk to Detect DNS Tunneling
Instructor: Steve Jaworski
Using Vagrant to Create Repeatable and Sharable Research Environments
Instructor: Shaun McCullough
What's New for Security in Microsoft Windows Server 2016 and Windows 10?
Instructor: Jason Fossen
Women's CONNECT Event
Instructor: Hosted by SANS COINS program and ISSA WIS SIG