Develop invaluable cybersecurity skills through interactive training during SANS 2021 - Live Online. Register now.

SANS 2017

Orlando, FL | Fri, Apr 7 - Fri, Apr 14, 2017
This event is over,
but there are more training opportunities.

Fr 7Sa 8Su 9Mo 10Tu 11We 12Th 13Fr 14
NewSEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Instructor: John Strand
NewSEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
Instructor: Adrien de Beaupre
NewSEC573: Automating Information Security with Python
Instructor: Mark Baggett
NewFOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
Instructor: Philip Hagen
WaitlistSEC401: Security Essentials Bootcamp Style
Instructor: Bryan Simon
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
FOR408: Windows Forensic Analysis
Instructor: Rob Lee
SEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Pieter Danhieux
SEC503: Intrusion Detection In-Depth  
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS Training Program for CISSP® Certification
Instructor: Seth Misenar
FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting
Instructor: Chad Tilbury
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: Stephen Sims
SEC505: Securing Windows and PowerShell Automation
Instructor: Jason Fossen
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: Clay Risenhoover
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses
Instructor: Larry Pesce
SEC575: Mobile Device Security and Ethical Hacking
Instructor: Joshua Wright
SEC301: Intro to Information Security
Instructor: Keith Palmgren
SEC522: Defending Web Applications Security Essentials
Instructor: Jason Lam
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
AUD440: Critical Security Controls: Planning, Implementing, and Auditing
Instructor: Randy Marchany
WaitlistMGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
MGT514: IT Security Strategic Planning, Policy, and Leadership
Instructor: Frank Kim
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Bryce Galbraith
SEC511: Continuous Monitoring and Security Operations
Instructor: Eric Conrad
SEC760: Advanced Exploit Development for Penetration Testers
Instructor: Jake Williams
FOR518: Mac Forensic Analysis
Instructor: Sarah Edwards
FOR578: Cyber Threat Intelligence
Instructor: Robert M. Lee
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
MGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
ICS410: ICS/SCADA Security Essentials
Instructor: Justin Searle
HOSTED: Physical Security Specialist - Full Comprehensive Edition
Instructor: The CORE Group
WaitlistCore NetWars Tournament
Instructor: Tim Medin
DFIR NetWars Tournament      
Arming SMB's Against Ransomware Attacks
Instructor: Timothy Ashford, Master's Degree Candidate
Be the Cheatsheet. Know Memory.
Instructor: Alissa Torres
Breaking Next Next (Next?) Gen Security Software
Instructor: John Strand
Cyber-Hygiene and Standards of Care: Practical Defenses against Advanced Attacks
Instructor: James Tarala
Database Activity Monitoring (DAM): How It Works, And What You Need To Know To Implement It
Instructor: Charles Brodsky, Master's Degree Candidate
General Session - Welcome to SANS
Instructor: Eric Conrad
GIAC Program Presentation
Instructor: Jeff Frisk
GSE Lab Examination
Instructor: Adrien de Beaupre
Impediments to Adoption of Two-Factor Authentication by Home End-Users
Instructor: Preston Ackerman, Master's Degree Candidate
Indicators of Compromise Ransomware TeslaCrypt Malware
Instructor: Kevin Kelly, Master's Degree Candidate
Influence and Implementation
Instructor: Wesley Earnest, Master's Degree Candidate
Learning Normal with the Kansa PowerShell Incident Response Framework
Instructor: Jason Simsay, Master's Degree Candidate
Logs Unite! - Forensic Analysis of Apple Unified Logs
Instructor: Sarah Edwards
Mobile Application Assessment
Instructor: Chris Crowley
Operating an ICS/SCADA Security Operations Center
Instructor: Robert M. Lee
Prioritizing Your Security Program
Instructor: Keith Palmgren
Quality not Quantity: Continuous Monitoring's Deadliest Events
Instructor: Eric Conrad
Securing Your Kids
Instructor: Lance Spitzner
Simple Approach to Access Control: Port Control and MAC Filtering
Instructor: William Knaffl, Master's Degree Candidate
SS7 - Teleco's Fallen Wall
Instructor: Hassan Mourad, Master's Degree Candidate
Taking Control of Your Application Security
Instructor: Eric Johnson
Ten Tenets of CISO Success
Instructor: Frank Kim
The End of Banking as We Know It: How Crypto Currencies and e-Payments are Breaking Up a Centuries-Old Monopoly
Instructor: G. Mark Hardy
The Internet of Things is Turning Against Us
Instructor: Johannes Ullrich, Ph.D.
The Tap House
Instructor: Philip Hagen
The Three C's to Building a Mature Awareness Program
Instructor: Lance Spitzner
You've Got Ransomeware! Managing the Legal Risk of Cyber Fraud
Instructor: Benjamin Wright