NewSEC504: Hacker Tools, Techniques, Exploits and Incident Handling | | | | | | | | | | |
NewSEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | | | |
NewMGT415: A Practical Introduction to Cyber Security Risk Management | | | | | | | | | | |
WaitlistSEC401: Security Essentials Bootcamp Style | | | | | | | | | | |
FOR408: Windows Forensic Analysis | | | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | | | |
SEC503: Intrusion Detection In-Depth | | | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | | | |
MGT414: SANS Training Program for CISSP® Certification | | | | | | | | | | |
FOR508: Advanced Digital Forensics and Incident Response | | | | | | | | | | |
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | | | | | |
SEC505: Securing Windows with PowerShell and the Critical Security Controls | | | | | | | | | | |
AUD507: Auditing & Monitoring Networks, Perimeters & Systems | | | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | | | |
SEC301: Intro to Information Security | | | | | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | | | |
AUD440: Critical Security Controls: Planning, Implementing, and Auditing | | | | | | | | | | |
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | | | | | |
MGT514: IT Security Strategic Planning, Policy, and Leadership | | | | | | | | | | |
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program | | | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | | | |
SEC511: Continuous Monitoring and Security Operations | | | | | | | | | | |
FOR572: Advanced Network Forensics and Analysis | | | | | | | | | | |
WaitlistFOR578: Cyber Threat Intelligence | | | | | | | | | | |
FOR585: Advanced Smartphone Forensics | | | | | | | | | | |
ICS410: ICS/SCADA Security Essentials | | | | | | | | | | |
HOSTED: Health Care Security Essentials | | | | | | | | | | |
HOSTED: Physical Penetration Testing | | | | | | | | | | |
Core NetWars Tournament | | | | | | | | | | |
DFIR NetWars Tournament | | | | | | | | | | |
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show True Risk Instructor: Beau Bullock | | | | | | | | | | |
Analyzing the Ukrainian Power Grid Cyber-Attacks Instructor: Jake Williams | | | | | | | | | | |
Card Fraud 101 Instructor: G. Mark Hardy | | | | | | | | | | |
Custom Digital Forensics Tools in Python Instructor: Evan Dygert | | | | | | | | | | |
Data Theft in the 21st Century Instructor: Mike Poor | | | | | | | | | | |
Debunking the Complex Password Myth Instructor: Keith Palmgren | | | | | | | | | | |
Enforcing Application Security Instructor: Michael Matthee - Master's Degree Candidate | | | | | | | | | | |
Exploits of Yesteryear Are Never Truly Gone Instructor: Marsha Miller - Master's Degree Candidate | | | | | | | | | | |
General Session - Welcome to SANS Instructor: Bryan Simon | | | | | | | | | | |
GIAC Program Reception Instructor: Presented by Jeff Frisk | | | | | | | | | | |
GSE Lab Examination | | | | | | | | | | |
How to Become a SANS Instructor Instructor: Eric Conrad | | | | | | | | | | |
Intrusion Detection with PowerShell Instructor: Michael Weeks - Master's Degree Candidate | | | | | | | | | | |
Making Awareness Stick Instructor: Lance Spitzner | | | | | | | | | | |
Making Deception a Thing for Things Instructor: Dr. Johannes Ullrich | | | | | | | | | | |
Malware Analysis for Incident Responders: Getting Started Instructor: Lenny Zeltser | | | | | | | | | | |
Next Gen Patch Management for Microsoft Windows - A Call for Improved Tools Instructor: Jason Simsay - Master's Degree Candidate | | | | | | | | | | |
PKI Trust Models: Whom do you trust? Instructor: Blaine Hein - Master's Degree Candidate | | | | | | | | | | |
Securing Your Kids Instructor: Lance Spitzner | | | | | | | | | | |
Smartphone and Network Forensics Goes Together Like Peas and Carrots Instructor: Heather Mahalik and Phil Hagen | | | | | | | | | | |
The 14 Absolute Truths of Security Instructor: Keith Palmgren | | | | | | | | | | |
The Crazy New World of Cyber Investigations: Law, Ethics and Evidence Instructor: Ben Wright | | | | | | | | | | |
The Current State of Cyber Security Instructor: Justin Searle | | | | | | | | | | |
Uncovering Indicators of Compromise (IoC) Using PowerShell, Event Logs, and Nagios Instructor: Dallas Haselhorst - Master's Degree Candidate | | | | | | | | | | |
Using an Open Source Threat Model for Prioritized Defense Instructor: James Tarala | | | | | | | | | | |
Windows Exploratory Surgery with Process Hacker Instructor: Jason Fossen | | | | | | | | | | |
Women in Technology Meet and Greet | | | | | | | | | | |