NewSEC504: Hacker Tools, Techniques, Exploits and Incident Handling | | | | | | | | |
NewSEC301: Intro to Information Security | | | | | | | | |
NewSEC511: Continuous Monitoring and Security Operations | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | |
FOR408: Windows Forensic Analysis | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | |
SEC503: Intrusion Detection In-Depth | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | |
MGT414: SANS Training Program for CISSP® Certification | | | | | | | | |
FOR508: Advanced Digital Forensics and Incident Response | | | | | | | | |
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | | | |
SEC505: Securing Windows with the Critical Security Controls | | | | | | | | |
AUD507: Auditing & Monitoring Networks, Perimeters & Systems | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | |
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | |
AUD440: Critical Security Controls: Planning, Implementing and Auditing | | | | | | | | |
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | | | |
MGT514: IT Security Strategic Planning, Policy and Leadership | | | | | | | | |
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | |
SEC642: Advanced Web App Penetration Testing and Ethical Hacking | | | | | | | | |
SEC573: Python for Penetration Testers | | | | | | | | |
SEC760: Advanced Exploit Development for Penetration Testers | | | | | | | | |
FOR572: Advanced Network Forensics and Analysis | | | | | | | | |
FOR585: Advanced Smartphone Forensics | | | | | | | | |
MGT415: A Practical Introduction to Risk Assessment | | | | | | | | |
HOSTED: Health Care Security Essentials | | | | | | | | |
HOSTED: Physical Penetration Testing | | | | | | | | |
Sold OutCore NetWars Tournament | | | | | | | | |
Sold OutDFIR NetWars Tournament | | | | | | | | |
A 0-Budget Approach to the Containment of Malware Traffic for Small Organizations Instructor: Paul Ackerman - Master's Degree Candidate | | | | | | | | |
Women in Technology Meet and Greet | | | | | | | | |
Cyber Leadership Reception | | | | | | | | |
Debunking the Complex Password Myth Instructor: Keith Palmgren | | | | | | | | |
Defense Needed, Superbees Wanted Instructor: Malik Mesellem | | | | | | | | |
Enterprise PowerShell for Remote Security Assessment Instructor: James Tarala | | | | | | | | |
General Session - Welcome to SANS Instructor: Dr. Eric Cole | | | | | | | | |
GIAC Program Overview Instructor: Jeff Frisk | | | | | | | | |
Gone In 60 Minutes Instructor: David Hoelzer | | | | | | | | |
Hacking Back, Active Defense and Internet Tough Guys Instructor: John Strand | | | | | | | | |
iOS Game Hacking: How I Ruled the Worl^Hd and Built Skills For AWESOME Mobile App Pen Tests Instructor: Josh Wright | | | | | | | | |
It's Time To Make a Case Instructor: Moses Hernandez | | | | | | | | |
Let's Face It, You Are Probably Compromised. What Next? Instructor: Joff Thyer | | | | | | | | |
Malware Analysis for Incident Responders: Getting Started Instructor: Lenny Zeltser | | | | | | | | |
Online Training Pool Party | | | | | | | | |
Preparing for PowerShellmageddon - Investigating Windows Command Line Activity Instructor: Chad Tilbury | | | | | | | | |
Raising the Bar with Security Skills Assessment and Training Instructor: Paul Hershberger - Master's Degree Candidate | | | | | | | | |
Registration Welcome Reception | | | | | | | | |
Router Vulnerabilities and Backdoors: Can You Trust Your Vendor? Instructor: Christoph Eckstein - Master's Degree Candidate | | | | | | | | |
SANS Technology Institute Reception and Information Session Instructor: Bill Lockhart, Executive Director, SANS Technology Institute | | | | | | | | |
Securing The Kids Instructor: Lance Spitzner | | | | | | | | |
Security Data Visualization Instructor: Balaji Balakrishnan - Master's Degree Candidate | | | | | | | | |
Self-Education: Using the Pull Method for Security Awareness Training Instructor: Lance Spitzner | | | | | | | | |
The 13 Absolute Truths of Security Instructor: Keith Palmgren | | | | | | | | |
The Law of Offensive Countermeasures, Active Defense or Whatever You Wanna Call It Instructor: Benjamin Wright | | | | | | | | |
Understanding the Offense to Build a Better Defense Instructor: Dr. Eric Cole | | | | | | | | |
Using an Open Source Threat Model for Prioritized Defense Instructor: James Tarala | | | | | | | | |
Using Sysmon to Enrich Security Onion's Host-Level Capabilities Instructor: Josh Brower - Master's Degree Candidate | | | | | | | | |
Windows Exploratory Surgery with Process Hacker Instructor: Jason Fossen | | | | | | | | |