NewSEC504: Hacker Tools, Techniques, Exploits, and Incident Handling | | | | | | | | |
NewSEC503: Intrusion Detection In-Depth | | | | | | | | |
NewFOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting | | | | | | | | |
NewSEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques | | | | | | | | |
NewFOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | |
FOR500: Windows Forensic Analysis | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | |
MGT414: SANS Training Program for CISSP® Certification | | | | | | | | |
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | | | |
SEC505: Securing Windows and PowerShell Automation | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | |
SEC301: Intro to Information Security | | | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | | | |
SEC440: Critical Security Controls: Planning, Implementing, and Auditing | | | | | | | | |
MGT514: IT Security Strategic Planning, Policy, and Leadership | | | | | | | | |
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | |
SEC546: IPv6 Essentials | | | | | | | | |
SEC511: Continuous Monitoring and Security Operations | | | | | | | | |
Sold OutSEC545: Cloud Security Architecture and Operations | | | | | | | | |
WaitlistSEC555: SIEM with Tactical Analytics | | | | | | | | |
WaitlistSEC564: Red Team Operations and Threat Emulation | | | | | | | | |
WaitlistSEC573: Automating Information Security with Python | | | | | | | | |
FOR578: Cyber Threat Intelligence | | | | | | | | |
FOR585: Advanced Smartphone Forensics | | | | | | | | |
MGT415: A Practical Introduction to Cyber Security Risk Management | | | | | | | | |
WaitlistDEV534: Secure DevOps: A Practical Introduction | | | | | | | | |
WaitlistDEV540: Secure DevOps and Cloud Application Security | | | | | | | | |
WaitlistICS410: ICS/SCADA Security Essentials | | | | | | | | |
WaitlistICS515: ICS Active Defense and Incident Response | | | | | | | | |
Core NetWars Tournament | | | | | | | | |
Cyber Defense NetWars Tournament | | | | | | | | |
DFIR NetWars Tournament | | | | | | | | |
Control Things Platform Instructor: Justin Searle | | | | | | | | |
7 Ways How Criminals Will Steal Your Cryptocoins Instructor: Johannes Ullrich, Ph.D. | | | | | | | | |
Actionable Detects: Blue Team Cyber Defense Tactics Instructor: Seth Misenar | | | | | | | | |
An Interactive Look at Defeating Advanced Adversaries and Implementing Kill Chain Controls Instructor: Stephen Sims | | | | | | | | |
APAC Student Reception at SANS Cyber Defense Initiative 2017 | | | | | | | | |
Blockchain: the New Digital Swiss Army Knife? Instructor: G. Mark Hardy | | | | | | | | |
Botnet Resiliency via Private Blockchains Instructor: Jonathan Sweeny- Master's Degree Candidate | | | | | | | | |
Building an Effective Security Monitoring Program Instructor: Jake Williams | | | | | | | | |
Cloud Security Testing Instructor: Edward Zamora- Master's Degree Candidate | | | | | | | | |
Coffee & Donuts with the Graduate Students | | | | | | | | |
Exploitation 101: Stacks, NX/DEP, ASLR and ROP! Instructor: David Hoelzer | | | | | | | | |
Fortune 100 InfoSec on a Budget Instructor: Eric Capuano | | | | | | | | |
General Session - Welcome to SANS Instructor: Bryan Simon | | | | | | | | |
GIAC Program Presentation Instructor: Scott Cassity | | | | | | | | |
Implementing an Enterprise Phishing Program Instructor: Serge Borso | | | | | | | | |
Industrial Control System Active Defense and Threat Intelligence Instructor: Robert M. Lee | | | | | | | | |
Introducing DeepBlueCLI, a PowerShell Module for Hunt Teaming Via Windows Event Logs Instructor: Eric Conrad | | | | | | | | |
Malware Analysis for Incident Responders: Getting Started Instructor: Lenny Zeltser | | | | | | | | |
Securing Your Kids Instructor: Lance Spitzner | | | | | | | | |
The 14 Absolute Truths of Security Instructor: Keith Palmgren | | | | | | | | |
The Three C's to Building a Mature Awareness Program Instructor: Lance Spitzner | | | | | | | | |
Three Keys for SecDevOps Success Instructor: Frank Kim | | | | | | | | |
Using an Open Source Threat Model for Prioritized Defense Instructor: James Tarala | | | | | | | | |
Welcome Reception | | | | | | | | |
When IoT Attacks: Understanding the Safety Risks Associated With Connected Devices Instructor: Billy Rios | | | | | | | | |
Women's CONNECT Event Instructor: Hosted by SANS COINS program and ISSA WIS SIG | | | | | | | | |