Get a GIAC Certification Attempt Included or $350 Off with SANS Online Training!

Cyber Defense Initiative 2017

Washington, DC | Tue, Dec 12 - Tue, Dec 19, 2017
This event is over,
but there are more training opportunities.

Tu 12We 13Th 14Fr 15Sa 16Su 17Mo 18Tu 19
SEC440: Critical Security Controls: Planning, Implementing, and Auditing
Instructor: Russell Eubanks
SEC546: IPv6 Essentials      
WaitlistSEC564: Red Team Operations and Threat Emulation
Instructor: Joe Vest
SEC567: Social Engineering for Penetration Testers
Instructor: Micah Hoffman
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Kevin Fiscus
MGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
WaitlistDEV534: Secure DevOps: A Practical Introduction
Instructor: Eric Johnson
SEC301: Intro to Information Security
Instructor: Keith Palmgren
SEC401: Security Essentials Bootcamp Style
Instructor: Bryan Simon
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
NewSEC503: Intrusion Detection In-Depth
Instructor: David Hoelzer
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Instructor: Michael Murr
SEC505: Securing Windows and PowerShell Automation
Instructor: Jason Fossen
SEC511: Continuous Monitoring and Security Operations
Instructor: Eric Conrad
SEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Micah Hoffman
Sold OutSEC545: Cloud Security Architecture and Operations
Instructor: Dave Shackleford
WaitlistSEC555: SIEM with Tactical Analytics
Instructor: Seth Misenar
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Kevin Fiscus
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
WaitlistSEC573: Automating Information Security with Python
Instructor: Mark Baggett
SEC575: Mobile Device Security and Ethical Hacking  
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
Instructor: Justin Searle
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: Stephen Sims
FOR500: Windows Forensic Analysis
Instructor: Ovie Carroll
FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting
Instructor: Chad Tilbury
FOR526: Memory Forensics In-Depth
Instructor: Alissa Torres
FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
Instructor: Philip Hagen
FOR578: Cyber Threat Intelligence
Instructor: Jake Williams
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS Training Program for CISSP® Certification
Instructor: David R. Miller
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
MGT514: IT Security Strategic Planning, Policy, and Leadership
Instructor: Frank Kim
DEV522: Defending Web Applications Security Essentials  
WaitlistDEV540: Secure DevOps and Cloud Application Security
Instructor: Eric Johnson
WaitlistICS410: ICS/SCADA Security Essentials
Instructor: Billy Rios
WaitlistICS515: ICS Active Defense and Incident Response
Instructor: Robert M. Lee
Core NetWars Experience
Instructor: Jeff McJunkin
Cyber Defense NetWars Tournament      
DFIR NetWars Tournament      
Welcome Reception
General Session - Welcome to SANS
Instructor: Bryan Simon
APAC Student Reception at SANS Cyber Defense Initiative 2017
Exploitation 101: Stacks, NX/DEP, ASLR and ROP!
Instructor: David Hoelzer
Women's CONNECT Event
Instructor: Hosted by SANS COINS program and ISSA WIS SIG
GIAC Program Presentation
Instructor: Scott Cassity
Actionable Detects: Blue Team Cyber Defense Tactics
Instructor: Seth Misenar
An Interactive Look at Defeating Advanced Adversaries and Implementing Kill Chain Controls
Instructor: Stephen Sims
Botnet Resiliency via Private Blockchains
Instructor: Jonathan Sweeny- Master's Degree Candidate
The 14 Absolute Truths of Security
Instructor: Keith Palmgren
The Three C's to Building a Mature Awareness Program
Instructor: Lance Spitzner
Using an Open Source Threat Model for Prioritized Defense
Instructor: James Tarala
Control Things Platform
Instructor: Justin Searle
Blockchain: the New Digital Swiss Army Knife?
Instructor: G. Mark Hardy
Cloud Security Testing
Instructor: Edward Zamora- Master's Degree Candidate
Securing Your Kids
Instructor: Lance Spitzner
Coffee & Donuts with the Graduate Students
Building an Effective Security Monitoring Program
Instructor: Jake Williams
Introducing DeepBlueCLI, a PowerShell Module for Hunt Teaming Via Windows Event Logs
Instructor: Eric Conrad
Malware Analysis for Incident Responders: Getting Started
Instructor: Lenny Zeltser
Three Keys for SecDevOps Success
Instructor: Frank Kim
7 Ways How Criminals Will Steal Your Cryptocoins
Instructor: Johannes Ullrich, Ph.D.
Industrial Control System Active Defense and Threat Intelligence
Instructor: Robert M. Lee
When IoT Attacks: Understanding the Safety Risks Associated With Connected Devices
Instructor: Billy Rios
Fortune 100 InfoSec on a Budget
Instructor: Eric Capuano
Implementing an Enterprise Phishing Program
Instructor: Serge Borso