NewSEC504: Hacker Tools, Techniques, Exploits, and Incident Handling | | | | | | | | |
NewSEC503: Intrusion Detection In-Depth | | | | | | | | |
NewFOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting | | | | | | | | |
NewSEC617: Wireless Penetration Testing and Ethical Hacking | | | | | | | | |
NewSEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques | | | | | | | | |
NewSEC455: SIEM Design & Implementation | | | | | | | | |
NewSEC460: Enterprise Threat and Vulnerability Assessment | | | | | | | | |
NewSEC555: SIEM with Tactical Analytics | | | | | | | | |
NewSEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses | | | | | | | | |
NewFOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response | | | | | | | | |
NewDEV540: Secure DevOps and Cloud Application Security | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | |
FOR500: Windows Forensic Analysis | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | |
MGT414: SANS Training Program for CISSP® Certification | | | | | | | | |
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | | | |
SEC505: Securing Windows and PowerShell Automation | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | |
Sold OutSEC575: Mobile Device Security and Ethical Hacking | | | | | | | | |
SEC301: Introduction to Cyber Security | | | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | |
SEC440: Critical Security Controls: Planning, Implementing, and Auditing | | | | | | | | |
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | | | |
WaitlistMGT514: Security Strategic Planning, Policy, and Leadership | | | | | | | | |
MGT433: SANS Security Awareness: How to Build, Maintain, and Measure a Mature Awareness Program | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | |
WaitlistSEC487: Open-Source Intelligence (OSINT) Gathering and Analysis | | | | | | | | |
SEC511: Continuous Monitoring and Security Operations | | | | | | | | |
WaitlistSEC530: Defensible Security Architecture | | | | | | | | |
WaitlistSEC545: Cloud Security Architecture and Operations | | | | | | | | |
SEC564: Red Team Operations and Threat Emulation | | | | | | | | |
SEC573: Automating Information Security with Python | | | | | | | | |
SEC760: Advanced Exploit Development for Penetration Testers | | | | | | | | |
WaitlistFOR518: Mac and iOS Forensic Analysis and Incident Response | | | | | | | | |
WaitlistFOR578: Cyber Threat Intelligence | | | | | | | | |
FOR585: Advanced Smartphone Forensics | | | | | | | | |
MGT415: A Practical Introduction to Cyber Security Risk Management | | | | | | | | |
ICS410: ICS/SCADA Security Essentials | | | | | | | | |
HOSTED: Physical Security Specialist - Full Comprehensive Edition | | | | | | | | |
WaitlistCore NetWars Tournament | | | | | | | | |
Cyber Defense NetWars Tournament | | | | | | | | |
DFIR NetWars Tournament | | | | | | | | |
ICS Netwars Tournament | | | | | | | | |
An Evening of Hacking the Internet of Things (IoT) Instructor: Stephen Sims, James Lyne, Tim Medin, & Jim Shewmaker | | | | | | | | |
APAC Student Reception at Network Security 2018 | | | | | | | | |
Blockchain 101 Instructor: G. Mark Hardy | | | | | | | | |
Coffee & Donuts with the Graduate Students | | | | | | | | |
Continuous Security: Monitoring & Active Defense in the Cloud Instructor: Eric Johnson | | | | | | | | |
Could We Have Stopped This? Attack Simulations for Blue Team Hardening Instructor: Alissa Torres | | | | | | | | |
Defense Is Doable - Breaking The Cyber Kill Chain Instructor: Erik Van Buggenhout & Stephen Sims | | | | | | | | |
General Session - Welcome to SANS Instructor: Bryan Simon | | | | | | | | |
GIAC Overview Presentation Instructor: Jeff Frisk | | | | | | | | |
GSE Lab Examination | | | | | | | | |
Hacking Dumberly, Just Like the Bad Guys Instructor: Tim Medin | | | | | | | | |
Let's Go Hunting Bad Guys Instructor: John Strand | | | | | | | | |
Nation State LevelHoneypotting: Emulating Vulnerable Applications at Scale Instructor: Dr. Johannes Ullrich | | | | | | | | |
Responding to the European Union's new General Data Protection Regulation Instructor: Ben Wright | | | | | | | | |
So, You Wanna be a Pentester? Instructor: Adrien de Beaupre | | | | | | | | |
Stuck in the Box, a SIEM's Tale Instructor: Justin Henderson | | | | | | | | |
Traveling Paranoid (but not too Paranoid) Instructor: Philip Hagen and Chris Crowley | | | | | | | | |
What is NetWars? Why play? Feel intimidated? Instructor: Jeff McJunkin | | | | | | | | |
WMI Attacks - What You Don't Know CAN Hurt You Instructor: Chad Tilbury | | | | | | | | |
Women's Connect & SANS Summits Workshop: How to Write Presentation Proposals for Cybersecurity Conferences Instructor: Alissa Torres, Heather Mahalik, My-Ngoc Nguyen, Phil Hagen, and Sarah Edwards | | | | | | | | |