SEC301: Intro to Information Security | | | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | | | |
SEC503: Intrusion Detection In-Depth | | | | | | | | | | |
SEC504: Hacker Techniques, Exploits & Incident Handling | | | | | | | | | | |
SEC505: Securing Windows with the Critical Security Controls | | | | | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | | | |
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses | | | | | | | | | | |
SEC642: Advanced Web App Penetration Testing and Ethical Hacking | | | | | | | | | | |
SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking | | | | | | | | | | |
FOR408: Windows Forensic Analysis | | | | | | | | | | |
FOR508: Advanced Computer Forensic Analysis and Incident Response | | | | | | | | | | |
Sold OutFOR572: Advanced Network Forensics and Analysis | | | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | | | |
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam | | | | | | | | | | |
NewMGT415: A Practical Introduction to Risk Assessment | | | | | | | | | | |
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program | | | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | | | |
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | | | | | |
AUD444: Auditing Security and Controls of Active Directory and Windows | | | | | | | | | | |
AUD445: Auditing Security and Controls of Oracle Databases | | | | | | | | | | |
AUD507: Auditing Networks, Perimeters, and Systems | | | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | | | |
HOSTED: Physical Penetration Testing - Introduction | | | | | | | | | | |
Core NetWars Tournament | | | | | | | | | | |
DFIR NetWars Tournament | | | | | | | | | | |
A Hands-on XML External Entity Vulnerability Training Module Instructor: Carrie Roberts - Master's Degree Candidate | | | | | | | | | | |
An Introduction to PowerShell for Security Assessments Instructor: James Tarala | | | | | | | | | | |
Analyzing a Second-Hand ATM (Automated Teller Machine) Instructor: Erik Van Buggenhout | | | | | | | | | | |
APT Attacks Exposed: Network, Host, Memory, and Malware Analysis Instructor: Rob Lee, Ovie Carroll, Alissa Torres, Phil Hagen, and Lenny Zeltser | | | | | | | | | | |
Building and Managing a PKI Solution for Small and Medium Size Business Instructor: Wylie Shanks - Master's Degree Candidate | | | | | | | | | | |
Continuous Ownage: Why you Need Continuous Monitoring Instructor: Seth Misenar and Eric Conrad | | | | | | | | | | |
Evolving VoIP Threats Instructor: Paul A. Henry | | | | | | | | | | |
General Session - Welcome to SANS Instructor: Rob Lee | | | | | | | | | | |
GIAC Program Overview Instructor: Jeff Frisk | | | | | | | | | | |
Hacking Back, Active Defense and Internet Tough Guys Instructor: John Strand | | | | | | | | | | |
How I Learned to Stop Worrying and be Agile! Instructor: James Leyte-Vidal | | | | | | | | | | |
How the West was Pwned Instructor: G.Mark Hardy | | | | | | | | | | |
How to Spy on your Employees with Memory Forensics Instructor: Jacob Williams and Alissa Torres | | | | | | | | | | |
Introduction to IDA Pro and Debugging Instructor: Stephen Sims | | | | | | | | | | |
Online Training Pool Party | | | | | | | | | | |
OpenSSL "Heartbleed" Vulnerability Instructor: Jake Williams | | | | | | | | | | |
RapidTriage: An Automated Approach to System Intrusion Discovery Instructor: Trenton Bond - Master's Degree Candidate | | | | | | | | | | |
Registration Welcome Reception | | | | | | | | | | |
RTC Security Instructor: Jason Ostrom | | | | | | | | | | |
SANS Technology Institute Open House Instructor: Alan Paller | | | | | | | | | | |
Securing The Kids Instructor: Lance Spitzner | | | | | | | | | | |
Security Awareness Metrics: Measuring Human Behavior Instructor: Lance Spitzner | | | | | | | | | | |
Security Static Vulnerable Devices Instructor: Chris Farrell - Master's Degree Candidate | | | | | | | | | | |
Social Engineering for Pentesters Instructor: Dave Shackleford | | | | | | | | | | |
The Law of Offensive Countermeasures, Active Defense or Whatever You Wanna Call It Instructor: Benjamin Wright | | | | | | | | | | |
The Security Onion Cloud Client: Network Security Monitoring for the Cloud Instructor: Joshua Brower - Master's Degree Candidate | | | | | | | | | | |
There's *GOLD* in Them Thar Package Management Databases! Instructor: Phil Hagen | | | | | | | | | | |
What is bWAPP? Web Application Penetration Testing with bWAPP Instructor: Malik Mesellem | | | | | | | | | | |
Windows Exploratory Surgery with Process Hacker Instructor: Jason Fossen | | | | | | | | | | |
Women in Technology Meet and Greet Instructor: Karen Fioravanti | | | | | | | | | | |