Ending Soon: Get a MacBook Air or Surface Pro 7 with 5 or 6 Day Training - Best Offers of the Year!

Network Security 2015

Las Vegas, NV | Sat, Sep 12 - Mon, Sep 21, 2015
This event is over,
but there are more training opportunities.

Sa 12Su 13Mo 14Tu 15We 16Th 17Fr 18Sa 19Su 20Mo 21
NewSEC301: Intro to Information Security
Instructor: Keith Palmgren
SEC401: Security Essentials Bootcamp Style
Instructor: Dr. Eric Cole
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
SEC503: Intrusion Detection In-Depth
Instructors: Mike Poor, Kevin Fiscus
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
Instructor: John Strand
SEC505: Securing Windows with PowerShell and the Critical Security Controls
Instructor: Jason Fossen
SEC511: Continuous Monitoring and Security Operations
Instructor: Eric Conrad
SEC522: Defending Web Applications Security Essentials    
NewSEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Seth Misenar
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
NewSEC562: CyberCity Hands-on Kinetic Cyber Range Exercise
Instructor: Tim Medin
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
SEC573: Python for Penetration Testers
Instructor: Mark Baggett
SEC575: Mobile Device Security and Ethical Hacking
Instructor: Joshua Wright
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses
Instructor: Larry Pesce
SEC642: Advanced Web App Penetration Testing and Ethical Hacking
Instructor: Justin Searle
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructors: Stephen Sims, James Lyne
FOR408: Windows Forensic Analysis
Instructor: Rob Lee
FOR508: Advanced Digital Forensics and Incident Response
Instructor: Chad Tilbury
FOR518: Mac Forensic Analysis
Instructor: Sarah Edwards
FOR526: Advanced Memory Forensics & Threat Detection
Instructor: Jake Williams
FOR572: Advanced Network Forensics and Analysis
Instructor: Philip Hagen
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS Training Program for CISSP® Certification
Instructor: Jonathan Ham
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
NewMGT514: IT Security Strategic Planning, Policy, and Leadership
Instructor: Frank Kim
WaitlistMGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: David Hoelzer
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
ICS410: ICS/SCADA Security Essentials
Instructor: Matthew Luallen
Sold OutCore NetWars Tournament
Instructor: Jeff McJunkin
Sold OutDFIR NetWars Tournament        
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Pieter Danhieux
NewMGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
AUD440: Critical Security Controls: Planning, Implementing and Auditing
Instructor: Randy Marchany
HOSTED: Health Care Security Essentials
Instructor: Greg Porter
HOSTED: Physical Penetration Testing
Instructor: The CORE Group
GSE Lab Examination
Registration Welcome Reception
General Session - Welcome to SANS
Instructor: Dr. Eric Cole
Women in Technology Meet and Greet
Instructor: Dr. Eric Cole
eAUDIT: Designing a Generic Tool to Review Entitlements
Instructor: Francois Begin - Master's Degree Candidate
Evolving Threats
Instructor: Paul Henry
Playing with SCADA's Modbus Protocol
Instructor: Justin Searle
Using an Open Source Threat Model for Prioritized Defense
Instructor: James Tarala
A History of ATM Violence
Instructor: Erik Van Buggenhout
Card Fraud 101
Instructor: G. Mark Hardy
Coding For Incident Response: Solving the Language Dilemma
Instructor: Shelly Giesbrecht - Master's Degree Candidate
What's New in Windows 10 and Server 2016?
Instructor: Jason Fossen
Death from Above: Hands-On Drone and IoT Hacking
Instructor: Josh Wright, Tim Medin, James Lyne, Steve Sims
DLP FAIL!!! Using Encoding, Steganography, and Covert Channels to Evade DLP and Other Critical Controls
Instructor: Kevin Fiscus
Finding Evil in the Whitelist
Instructor: Josh Johnson - Master's Degree Candidate
iOS Game Hacking: How I Ruled the Worl^Hd and Built Skills For AWESOME Mobile App Pen Test
Instructor: Josh Wright
The Crazy New World of Cyber Investigations: Law, Ethics and Evidence
Instructor: Ben Wright
Hacking Back, Active Defense and Internet Tough Guys
Instructor: John Strand
Live Long and Prosper by Protecting SPoC!
Instructor: David Belangia - Master's Degree Candidate
Meterpreter without Meterpreter
Instructor: Mark Baggett
Smartphone and Network Forensics Goes Together Like Peas and Carrots
Instructor: Heather Mahalik and Phil Hagen
Debunking the Complex Password Myth
Instructor: Keith Palmgren
Malware Analysis Essentials using REMnux
Instructor: Lenny Zeltser
Making Awareness Stick
Instructor: Lance Spitzner
Securing The Kids
Instructor: Lance Spitzner