NewFOR508: Advanced Computer Forensic Analysis and Incident Response | | | | | | | | |
NewMGT415: A Practical Introduction to Risk Assessment | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | |
SEC504: Hacker Techniques, Exploits & Incident Handling | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | |
FOR408: Computer Forensic Investigations - Windows In-Depth | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | |
SEC503: Intrusion Detection In-Depth | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | |
Sold OutFOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | |
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam | | | | | | | | |
SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking | | | | | | | | |
SEC505: Securing Windows and Resisting Malware | | | | | | | | |
AUD507: Auditing Networks, Perimeters, and Systems | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | |
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | |
SEC301: Intro to Information Security | | | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | |
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | | | |
WaitlistMGT514: IT Security Strategic Planning, Policy and Leadership | | | | | | | | |
MGT433: Securing The Human: Building and Deploying an Effective Security Awareness Program | | | | | | | | |
SEC546: IPv6 Essentials | | | | | | | | |
WaitlistSEC642: Advanced Web App Penetration Testing and Ethical Hacking | | | | | | | | |
AUD521: Meeting the Minimum: PCI/DSS 2.0: Becoming and Staying Compliant | | | | | | | | |
AUD444: Auditing Security and Controls of Active Directory and Windows | | | | | | | | |
AUD445: Auditing Security and Controls of Oracle Databases | | | | | | | | |
HOSTED: Physical Penetration Testing - Introduction | | | | | | | | |
Core NetWars Tournament | | | | | | | | |
"Hall of Shame" Apps in the Apple App Store and Google Play Instructor: Tom Eston | | | | | | | | |
APT: It is Not Time to Pray, It is Time to Act Instructor: Dr. Eric Cole | | | | | | | | |
Finding Unknown Malware Instructor: Alissa Torres | | | | | | | | |
General Session - Welcome to SANS Instructor: Dr. Eric Cole | | | | | | | | |
GIAC Program Overview Instructor: Jeff Frisk, GIAC Program Director | | | | | | | | |
Hacking Your Friends and Neighbors For Fun Instructor: Joshua Wright | | | | | | | | |
Honeypots For Home Use Instructor: James Leyte-Vidal | | | | | | | | |
Human Nature and Information Security: Irrational and Extraneous Factors That Matter Instructor: Lenny Zeltser | | | | | | | | |
Hunting and Sniper Forensics Instructor: Jason Lawrence | | | | | | | | |
InfoSec in the Financial World: War Stories and Lessons Learned Instructor: Bryan Simon | | | | | | | | |
Introduction to Windows Kernel Exploitation Instructor: Stephen Sims | | | | | | | | |
Knock-off Phone Forensics -Some Handsets Aren't What They Appear To Be Instructor: Heather Mahalik | | | | | | | | |
Open Mic Night Instructor: Brought to you by SANS Online Training | | | | | | | | |
Over-Zealous Social Media Investigations: Beware the Privacy Monster Instructor: Ben Wright | | | | | | | | |
Panel - How Do We Secure The Human Instructor: Panel Members | | | | | | | | |
Phish Stories: Technical Intervention when Humans Fail Instructor: Rich Graves | | | | | | | | |
Physical Repair of Mobile Devices - Practical Tips & Tricks For When Good Evidence Gets Broken Instructor: Det. Cindy Murphy | | | | | | | | |
Please Keep Your Brain Juice Off My Enigma: a True Story Instructor: Ed Skoudis & Josh Wright | | | | | | | | |
Project Management Approach to Yearly PCI Compliance Validation Instructor: Michael Hoehl | | | | | | | | |
SANS Technology Institute Open House Instructor: Ray Davidson | | | | | | | | |
Securing the Kids Instructor: Lance Spitzner and Rich Wistocki | | | | | | | | |
Small Business: The New Target -- What Can They Do? Instructor: Robert L Comella | | | | | | | | |
Social Zombies: Rise of the Mobile Dead Instructor: Kevin Johnson & Tom Eston | | | | | | | | |
Tales from the Crypt: TrueCrypt Analysis Instructor: Hal Pomeranz | | | | | | | | |
Who's Watching the Watchers? Instructor: Mike Poor | | | | | | | | |
Why Our Defenses Are Failing Us. One Click Is All It Takes... Instructor: Bryce Galbraith | | | | | | | | |
Women in Technology Meet and Greet Instructor: Karen Fioravanti | | | | | | | | |
You Can Panic Now. Host Protection is (Mostly) Dead. Instructor: Rob Lee | | | | | | | | |