Get a GIAC Certification Attempt Included or $350 Off with SANS Online Training!

Network Security 2015

Las Vegas, NV | Sat, Sep 12 - Mon, Sep 21, 2015
This event is over,
but there are more training opportunities.

Sa 12Su 13Mo 14Tu 15We 16Th 17Fr 18Sa 19Su 20Mo 21
NewSEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Seth Misenar
NewSEC301: Intro to Information Security
Instructor: Keith Palmgren
NewMGT514: IT Security Strategic Planning, Policy, and Leadership
Instructor: Frank Kim
NewMGT535: Incident Response Team Management        
NewSEC550: Active Defense, Offensive Countermeasures and Cyber Deception
Instructor: Bryce Galbraith
NewSEC562: CyberCity Hands-on Kinetic Cyber Range Exercise
Instructor: Tim Medin
NewMGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
SEC401: Security Essentials Bootcamp Style
Instructor: Dr. Eric Cole
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
Instructor: John Strand
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
FOR408: Windows Forensic Analysis
Instructor: Rob Lee
SEC503: Intrusion Detection In-Depth
Instructors: Mike Poor, Kevin Fiscus
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS Training Program for CISSP® Certification
Instructor: Jonathan Ham
FOR508: Advanced Digital Forensics and Incident Response
Instructor: Chad Tilbury
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructors: Stephen Sims, James Lyne
SEC505: Securing Windows with PowerShell and the Critical Security Controls
Instructor: Jason Fossen
SEC579: Virtualization and Private Cloud Security
Instructor: Dave Shackleford
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: David Hoelzer
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses
Instructor: Larry Pesce
SEC575: Mobile Device Security and Ethical Hacking
Instructor: Joshua Wright
DEV522: Defending Web Applications Security Essentials    
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
DEV541: Secure Coding in Java/JEE: Developing Defensible Applications
Instructor: Gregory Leonard
AUD440: Critical Security Controls: Planning, Implementing and Auditing
Instructor: Randy Marchany
SEC506: Securing Linux/Unix
Instructor: Hal Pomeranz
DEV544: Secure Coding in .NET: Developing Defensible Applications
Instructor: Eric Johnson
WaitlistMGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Pieter Danhieux
SEC642: Advanced Web App Penetration Testing and Ethical Hacking
Instructor: Justin Searle
MGT305: Technical Communication and Presentation Skills for Security Professionals
Instructor: David Hoelzer
FOR526: Memory Forensics In-Depth
Instructor: Jake Williams
SEC511: Continuous Monitoring and Security Operations
Instructor: Eric Conrad
SEC561: Immersive Hands-on Hacking Techniques    
SEC573: Python for Penetration Testers
Instructor: Mark Baggett
FOR518: Mac Forensic Analysis
Instructor: Sarah Edwards
FOR572: Advanced Network Forensics and Analysis
Instructor: Philip Hagen
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
ICS410: ICS/SCADA Security Essentials
Instructor: Matthew Luallen
Sold OutCore NetWars Experience
Instructor: Jeff McJunkin
Sold OutDFIR NetWars Tournament        
HOSTED: Health Care Security Essentials
Instructor: Greg Porter
HOSTED: Physical Penetration Testing
Instructor: The CORE Group
A History of ATM Violence
Instructor: Erik Van Buggenhout
Card Fraud 101
Instructor: G. Mark Hardy
Coding For Incident Response: Solving the Language Dilemma
Instructor: Shelly Giesbrecht - Master's Degree Candidate
Death from Above: Hands-On Drone and IoT Hacking
Instructor: Josh Wright, Tim Medin, James Lyne, Steve Sims
Debunking the Complex Password Myth
Instructor: Keith Palmgren
DLP FAIL!!! Using Encoding, Steganography, and Covert Channels to Evade DLP and Other Critical Controls
Instructor: Kevin Fiscus
eAUDIT: Designing a Generic Tool to Review Entitlements
Instructor: Francois Begin - Master's Degree Candidate
Evolving Threats
Instructor: Paul Henry
Finding Evil in the Whitelist
Instructor: Josh Johnson - Master's Degree Candidate
General Session - Welcome to SANS
Instructor: Dr. Eric Cole
GSE Lab Examination
Hacking Back, Active Defense and Internet Tough Guys
Instructor: John Strand
iOS Game Hacking: How I Ruled the Worl^Hd and Built Skills For AWESOME Mobile App Pen Test
Instructor: Josh Wright
Live Long and Prosper by Protecting SPoC!
Instructor: David Belangia - Master's Degree Candidate
Making Awareness Stick
Instructor: Lance Spitzner
Malware Analysis Essentials using REMnux
Instructor: Lenny Zeltser
Meterpreter without Meterpreter
Instructor: Mark Baggett
Playing with SCADA's Modbus Protocol
Instructor: Justin Searle
Registration Welcome Reception
Securing The Kids
Instructor: Lance Spitzner
Smartphone and Network Forensics Goes Together Like Peas and Carrots
Instructor: Heather Mahalik and Phil Hagen
The Crazy New World of Cyber Investigations: Law, Ethics and Evidence
Instructor: Ben Wright
Using an Open Source Threat Model for Prioritized Defense
Instructor: James Tarala
What's New in Windows 10 and Server 2016?
Instructor: Jason Fossen
Instructor: Dr. Eric Cole
Women in Technology Meet and Greet