NewSEC504: Hacker Tools, Techniques, Exploits, and Incident Handling | | | | | | | | |
NewSEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques | | | | | | | | |
NewSEC573: Automating Information Security with Python | | | | | | | | |
NewFOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response | | | | | | | | |
WaitlistSEC401: Security Essentials Bootcamp Style | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | |
FOR408: Windows Forensic Analysis | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | |
SEC503: Intrusion Detection In-Depth | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | |
MGT414: SANS Training Program for CISSP® Certification | | | | | | | | |
FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting | | | | | | | | |
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | | | |
SEC505: Securing Windows and PowerShell Automation | | | | | | | | |
AUD507: Auditing & Monitoring Networks, Perimeters & Systems | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | |
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | |
SEC301: Intro to Information Security | | | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | |
AUD440: Critical Security Controls: Planning, Implementing, and Auditing | | | | | | | | |
WaitlistMGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | | | |
MGT514: IT Security Strategic Planning, Policy, and Leadership | | | | | | | | |
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | |
SEC511: Continuous Monitoring and Security Operations | | | | | | | | |
SEC760: Advanced Exploit Development for Penetration Testers | | | | | | | | |
FOR518: Mac Forensic Analysis | | | | | | | | |
FOR578: Cyber Threat Intelligence | | | | | | | | |
FOR585: Advanced Smartphone Forensics | | | | | | | | |
MGT415: A Practical Introduction to Cyber Security Risk Management | | | | | | | | |
ICS410: ICS/SCADA Security Essentials | | | | | | | | |
HOSTED: Physical Security Specialist - Full Comprehensive Edition | | | | | | | | |
WaitlistCore NetWars Tournament | | | | | | | | |
DFIR NetWars Tournament | | | | | | | | |
Arming SMB's Against Ransomware Attacks Instructor: Timothy Ashford, Master's Degree Candidate | | | | | | | | |
Be the Cheatsheet. Know Memory. Instructor: Alissa Torres | | | | | | | | |
Breaking Next Next (Next?) Gen Security Software Instructor: John Strand | | | | | | | | |
Cyber-Hygiene and Standards of Care: Practical Defenses against Advanced Attacks Instructor: James Tarala | | | | | | | | |
Database Activity Monitoring (DAM): How It Works, And What You Need To Know To Implement It Instructor: Charles Brodsky, Master's Degree Candidate | | | | | | | | |
General Session - Welcome to SANS Instructor: Eric Conrad | | | | | | | | |
GIAC Program Presentation Instructor: Jeff Frisk | | | | | | | | |
GSE Lab Examination | | | | | | | | |
HTTPDeux Instructor: Adrien de Beaupre | | | | | | | | |
Impediments to Adoption of Two-Factor Authentication by Home End-Users Instructor: Preston Ackerman, Master's Degree Candidate | | | | | | | | |
Indicators of Compromise Ransomware TeslaCrypt Malware Instructor: Kevin Kelly, Master's Degree Candidate | | | | | | | | |
Influence and Implementation Instructor: Wesley Earnest, Master's Degree Candidate | | | | | | | | |
Learning Normal with the Kansa PowerShell Incident Response Framework Instructor: Jason Simsay, Master's Degree Candidate | | | | | | | | |
Logs Unite! - Forensic Analysis of Apple Unified Logs Instructor: Sarah Edwards | | | | | | | | |
Mobile Application Assessment Instructor: Chris Crowley | | | | | | | | |
Operating an ICS/SCADA Security Operations Center Instructor: Robert M. Lee | | | | | | | | |
Prioritizing Your Security Program Instructor: Keith Palmgren | | | | | | | | |
Quality not Quantity: Continuous Monitoring's Deadliest Events Instructor: Eric Conrad | | | | | | | | |
Securing Your Kids Instructor: Lance Spitzner | | | | | | | | |
Simple Approach to Access Control: Port Control and MAC Filtering Instructor: William Knaffl, Master's Degree Candidate | | | | | | | | |
SS7 - Teleco's Fallen Wall Instructor: Hassan Mourad, Master's Degree Candidate | | | | | | | | |
Taking Control of Your Application Security Instructor: Eric Johnson | | | | | | | | |
Ten Tenets of CISO Success Instructor: Frank Kim | | | | | | | | |
The End of Banking as We Know It: How Crypto Currencies and e-Payments are Breaking Up a Centuries-Old Monopoly Instructor: G. Mark Hardy | | | | | | | | |
The Internet of Things is Turning Against Us Instructor: Johannes Ullrich, Ph.D. | | | | | | | | |
The Tap House Instructor: Philip Hagen | | | | | | | | |
The Three C's to Building a Mature Awareness Program Instructor: Lance Spitzner | | | | | | | | |
You've Got Ransomeware! Managing the Legal Risk of Cyber Fraud Instructor: Benjamin Wright | | | | | | | | |