NewSEC504: Hacker Tools, Techniques, Exploits, and Incident Handling | | | | | | |
NewSEC503: Intrusion Detection In-Depth | | | | | | |
NewSEC488: Cloud Security Essentials | | | | | | |
NewSEC588: Cloud Penetration Testing | | | | | | |
BetaMGT521: Leading Cybersecurity Change: Building a Security-Based Culture | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | |
FOR500: Windows Forensic Analysis | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | |
MGT512: Security Leadership Essentials for Managers | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | |
MGT414: SANS Training Program for CISSP® Certification | | | | | | |
FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics | | | | | | |
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | |
SEC505: Securing Windows and PowerShell Automation | | | | | | |
AUD507: Auditing & Monitoring Networks, Perimeters & Systems | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | |
SEC301: Introduction to Cyber Security | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | |
MGT514: Security Strategic Planning, Policy, and Leadership | | | | | | |
SEC450: Blue Team Fundamentals: Security Operations and Analysis | | | | | | |
SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis | | | | | | |
Sold OutSEC488: Cloud Security Essentials | | | | | | |
SEC511: Continuous Monitoring and Security Operations | | | | | | |
SEC530: Defensible Security Architecture and Engineering | | | | | | |
SEC540: Cloud Security and DevOps Automation | | | | | | |
SEC545: Cloud Security Architecture and Operations | | | | | | |
SEC555: SIEM with Tactical Analytics | | | | | | |
FOR498: Battlefield Forensics & Data Acquisition | | | | | | |
FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response | | | | | | |
FOR578: Cyber Threat Intelligence | | | | | | |
FOR585: Smartphone Forensic Analysis In-Depth | | | | | | |
ICS410: ICS/SCADA Security Essentials | | | | | | |
ICS515: ICS Active Defense and Incident Response | | | | | | |
Core NetWars Tournament | | | | | | |
Cyber Defense NetWars Tournament | | | | | | |
DFIR NetWars Tournament | | | | | | |
Boiling the Domain Ocean: Proactive Threat Intelligence Instructor: Kyle Ehmke | | | | | | |
Cloud(y) With a Chance of Data Breach Instructor: Dr. Torsten George | | | | | | |
Defense Against the Dark Arts: Dissecting Sandbox Evasion Techniques Instructor: Ben Abbott | | | | | | |
Detection and Forensics on DNS Tunneling Instructor: Tim Helming | | | | | | |
Driving the Revolution of Secure Networking with SASE Instructor: J.T. CLAY | | | | | | |
How to Defend the Enterprise While You Shift to the Cloud Instructor: Chris O'Brien | | | | | | |
Preventing Data Breaches Instructor: Becca Petrin | | | | | | |
SANS.edu Undergraduate & Graduate Programs Information Session | | | | | | |
SANS@Mic - "Zero trust" ≠ paranoia; it's SMART! Instructor: Chris Edmundson | | | | | | |
SANS@Mic - 2020 Security Operations Center (SOC) Survey - It's Been a Hard Year Instructor: Chris Crowley | | | | | | |
SANS@Mic - Verifying Sketchy Windows Apps Instructor: Joal Mendonsa | | | | | | |
Secure Your Data, Your Recovery and Your Mission Instructor: Brian Brockway & David DeVries | | | | | | |
Speed, Extensibility, and Choice: Why NDR Wants to be Open Instructor: Greg Bell | | | | | | |
Vulnerability Remediation Made Easier with Security Automation Instructor: Jay Spann | | | | | | |