NewSEC504: Hacker Tools, Techniques, Exploits, and Incident Handling | | | | | | |
NewSEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques | | | | | | |
NewSEC450: Blue Team Fundamentals: Security Operations and Analysis | | | | | | |
NewSEC460: Enterprise and Cloud | Threat and Vulnerability Assessment | | | | | | |
BetaSEC552: Bug Bounties and Responsible Disclosure | | | | | | |
NewSEC588: Cloud Penetration Testing | | | | | | |
NewFOR498: Battlefield Forensics & Data Acquisition | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | |
FOR500: Windows Forensic Analysis | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | |
MGT512: Security Leadership Essentials for Managers | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | |
MGT414: SANS Training Program for CISSP® Certification | | | | | | |
FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics | | | | | | |
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | |
SEC505: Securing Windows and PowerShell Automation | | | | | | |
AUD507: Auditing & Monitoring Networks, Perimeters & Systems | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | |
SEC617: Wireless Penetration Testing and Ethical Hacking | | | | | | |
SEC301: Introduction to Cyber Security | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | |
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | |
MGT514: Security Strategic Planning, Policy, and Leadership | | | | | | |
SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis | | | | | | |
WaitlistSEC488: Cloud Security Essentials | | | | | | |
SEC511: Continuous Monitoring and Security Operations | | | | | | |
SEC530: Defensible Security Architecture and Engineering | | | | | | |
SEC540: Cloud Security and DevOps Automation | | | | | | |
SEC545: Cloud Security Architecture and Operations | | | | | | |
SEC555: SIEM with Tactical Analytics | | | | | | |
SEC573: Automating Information Security with Python | | | | | | |
SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses | | | | | | |
FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response | | | | | | |
FOR578: Cyber Threat Intelligence | | | | | | |
ICS410: ICS/SCADA Security Essentials | | | | | | |
Core NetWars Tournament | | | | | | |
Automating Event Triage in the Cloud Instructor: Jay Spann | | | | | | |
Back to the (Cyber) Future: Tomorrow's Cybersecurity Relies on Today's Asset Management Instructor: Andrew Senko | | | | | | |
Confidence in Security Intelligence Instructor: John Wetzel | | | | | | |
Defense Against the Dark Arts: Dissecting Sandbox Evasion Techniques Instructor: Ben Abbott | | | | | | |
Influencing a Software Vendor's Roadmap Instructor: James Nixon | | | | | | |
Leveraging Asset Visibility to Enhance Security Operations Instructor: Mehul Revankar | | | | | | |
Moving Left: Driving Proactive Defense through Threat Investigation Instructor: Jackie Abrams | | | | | | |
Network Security Monitoring vs Encryption Instructor: Richard Bejtlich | | | | | | |
SANS.edu Undergraduate & Graduate Programs Information Session | | | | | | |
SANS@Mic - OSINT Geolocation Techniques and How to Prevent Them Instructor: Micah Hoffman | | | | | | |
SANS@Mic PowerShell 2020: State of the Art / Hack / Infection Instructor: Jason Fossen | | | | | | |
Solving Network and Security Challenges with SASE Instructor: Nitin Kumar, Eric Trolan | | | | | | |
The Myths of Network Security Instructor: Matt Cauthorn | | | | | | |