Last week to get a GIAC Certification Attempt Included with Online Training - Ends Soon!

Cyber Defense Initiative 2017

Washington, DC | Tue, Dec 12 - Tue, Dec 19, 2017
Event starts in 54 Days

Tu 12We 13Th 14Fr 15Sa 16Su 17Mo 18Tu 19
SEC440: Critical Security Controls: Planning, Implementing, and Auditing
Instructor: Russell Eubanks
SEC546: IPv6 Essentials      
NewSEC564: Red Team Operations and Threat Emulation
Instructor: Joe Vest
SEC567: Social Engineering for Penetration Testers
Instructor: Micah Hoffman
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Kevin Fiscus
MGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
NewDEV534: Secure DevOps: A Practical Introduction
Instructor: Eric Johnson
SEC301: Intro to Information Security
Instructor: Keith Palmgren
SEC401: Security Essentials Bootcamp Style
Instructor: Bryan Simon
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
NewSEC503: Intrusion Detection In-Depth
Instructor: David Hoelzer
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Instructor: Michael Murr
SEC505: Securing Windows and PowerShell Automation
Instructor: Jason Fossen
SEC511: Continuous Monitoring and Security Operations
Instructor: Eric Conrad
SEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Micah Hoffman
WaitlistSEC545: Cloud Security Architecture and Operations
Instructor: Dave Shackleford
NewSEC555: SIEM with Tactical Analytics
Instructor: Seth Misenar
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Kevin Fiscus
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
SEC573: Automating Information Security with Python
Instructor: Mark Baggett
SEC575: Mobile Device Security and Ethical Hacking  
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
Instructor: Justin Searle
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: Stephen Sims
FOR500: Windows Forensic Analysis
Instructor: Ovie Carroll
FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting
Instructor: Chad Tilbury
FOR526: Memory Forensics In-Depth
Instructor: Alissa Torres
FOR572: Advanced Network Forensics and Analysis
Instructor: Philip Hagen
FOR578: Cyber Threat Intelligence
Instructor: Jake Williams
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS Training Program for CISSP® Certification
Instructor: David R. Miller
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
MGT514: IT Security Strategic Planning, Policy, and Leadership
Instructor: Frank Kim
DEV522: Defending Web Applications Security Essentials  
NewDEV540: Secure DevOps and Cloud Application Security
Instructor: Eric Johnson
ICS410: ICS/SCADA Security Essentials
Instructor: Billy Rios
ICS515: ICS Active Defense and Incident Response
Instructor: Robert M. Lee
Core NetWars Experience
Instructor: Jeff McJunkin
Cyber Defense NetWars Tournament      
DFIR NetWars Tournament      
General Session - Welcome to SANS
Instructor: Bryan Simon
Exploitation 101: Stacks, NX/DEP, ASLR and ROP!
Instructor: David Hoelzer
Women's CONNECT Event
Instructor: Hosted by SANS COINS program and ISSA WIS SIG
GIAC Program Presentation
Instructor: Scott Cassity
Actionable Detects: Blue Team Cyber Defense Tactics
Instructor: Seth Misenar
The 14 Absolute Truths of Security
Instructor: Keith Palmgren
The Three C's to Building a Mature Awareness Program
Instructor: Lance Spitzner
Using an Open Source Threat Model for Prioritized Defense
Instructor: James Tarala
Control Things Platform
Instructor: Justin Searle
An Interactive Look at Defeating Advanced Adversaries and Implementing Kill Chain Controls
Instructor: Stephen Sims
Blockchain: the New Digital Swiss Army Knife?
Instructor: G. Mark Hardy
Securing Your Kids
Instructor: Lance Spitzner
Building an Effective Security Monitoring Program
Instructor: Jake Williams
Introducing DeepBlueCLI, a PowerShell Module for Hunt Teaming Via Windows Event Logs
Instructor: Eric Conrad
Malware Analysis for Incident Responders: Getting Started
Instructor: Lenny Zeltser
Industrial Control System Active Defense and Threat Intelligence
Instructor: Robert M. Lee
The Security Impact of IPv6
Instructor: Johannes Ullrich, Ph.D.
When IoT Attacks: Understanding the Safety Risks Associated With Connected Devices
Instructor: Billy Rios
Fortune 100 InfoSec on a Budget
Instructor: Eric Capuano