NewSEC573: Python for Penetration Testers | | | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | | | |
SEC504: Hacker Techniques, Exploits & Incident Handling | | | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | | | |
FOR408: Computer Forensic Investigations - Windows In-Depth | | | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | | | |
SEC503: Intrusion Detection In-Depth | | | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | | | |
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam | | | | | | | | | | |
FOR508: Advanced Computer Forensic Analysis and Incident Response | | | | | | | | | | |
SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking | | | | | | | | | | |
SEC505: Securing Windows and Resisting Malware | | | | | | | | | | |
AUD507: Auditing Networks, Perimeters, and Systems | | | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | | | |
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses | | | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | | | |
SEC301: Intro to Information Security | | | | | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | | | |
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | | | | | |
MGT514: IT Security Strategic Planning, Policy and Leadership | | | | | | | | | | |
MGT433: Securing The Human: Building and Deploying an Effective Security Awareness Program | | | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | | | |
SEC546: IPv6 Essentials | | | | | | | | | | |
SEC509: Securing Oracle Databases | | | | | | | | | | |
AUD444: Auditing Security and Controls of Active Directory and Windows | | | | | | | | | | |
HOSTED: Onapsis: Securing SAP Platforms - Hands-on Security Techniques to Protect Business-Critical Infrastructure from Cyber-attacks | | | | | | | | | | |
Core NetWars Tournament | | | | | | | | | | |
Effective Phishing that Employees Like Instructor: Lance Spitzner | | | | | | | | | | |
'Open Mic Night' | | | | | | | | | | |
Active Defense, Crime, and Punishment: New Tools to Find Bad People Instructor: John Strand | | | | | | | | | | |
Applying the 32 Zombieland Rules to IT Security Instructor: Larry Pesce | | | | | | | | | | |
APT: It is Time to Act Instructor: Dr. Eric Cole | | | | | | | | | | |
Crayons Never Uploaded Our Stuff to the Internet! Instructor: Kevin Johnson | | | | | | | | | | |
General Session - Welcome to SANS Instructor: Dr. Eric Cole | | | | | | | | | | |
GIAC Program Overview Instructor: Jeff Frisk, GIAC Director | | | | | | | | | | |
Hacker Guard Quarterly Briefing Instructor: John Strand | | | | | | | | | | |
Hacking Your Friends and Neighbors For Fun Instructor: Joshua Wright | | | | | | | | | | |
Have no fear - DFIR is here! Instructor: Rob Lee, Chad Tilbury, Alissa Torres, and Lenny Zeltser | | | | | | | | | | |
How the West was Pwned Instructor: G. Mark Hardy | | | | | | | | | | |
Industrial (In)Security – How we got here and where to go next Instructor: Graham Speake | | | | | | | | | | |
Information Assurance Metrics: Practical Steps to Measurement Instructor: James Tarala | | | | | | | | | | |
InfoSec Vertigo: Small Medical Lab Wages War Against InfoSec Vendor, US Government, and Big DC Law Firm Instructor: Benjamin Wright and Michael Daugherty, President of LabMD | | | | | | | | | | |
Introducing the CompTIA CASP Exam Instructor: Seth Misenar | | | | | | | | | | |
SANS Technology Institute Master's Presentation Instructor: Courtney Imbert | | | | | | | | | | |
SANS Technology Institute Master's Presentation Instructor: George Khalil | | | | | | | | | | |
SANS Technology Institute Master's Presentation Instructor: Trenton Bond | | | | | | | | | | |
SANS Technology Institute Master's Presentation Instructor: Mason Pokladnik | | | | | | | | | | |
SANS Technology Institute Open House Instructor: Dr. Toby Gouker, Provost | | | | | | | | | | |
Securing The Kids Instructor: Lance Spitzner | | | | | | | | | | |
Sick Anti-analysis Mechanisms in the Wild Instructor: Alissa Torres | | | | | | | | | | |
The Security Impact of IPv6 Instructor: Johannes Ullrich | | | | | | | | | | |
Windows Exploratory Surgery with Process Hacker Instructor: Jason Fossen | | | | | | | | | | |