SANS Online Training Special: Get an iPad Mini, Chromebook Flip, or $250 Off until 10/30! 

SANS 2017

Orlando, FL | Fri, Apr 7 - Fri, Apr 14, 2017
This event is over,
but there are more training opportunities.

Fr 7Sa 8Su 9Mo 10Tu 11We 12Th 13Fr 14
SEC524: Cloud Security Fundamentals
Instructor: Jorge Orchilles
SEC567: Social Engineering for Penetration Testers
Instructor: Dave Shackleford
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Bryce Galbraith
MGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
AUD440: Critical Security Controls: Planning, Implementing, and Auditing
Instructor: Randy Marchany
SEC301: Intro to Information Security
Instructor: Keith Palmgren
WaitlistSEC401: Security Essentials Bootcamp Style
Instructor: Bryan Simon
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
SEC503: Intrusion Detection In-Depth  
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Instructor: John Strand
SEC505: Securing Windows and PowerShell Automation
Instructor: Jason Fossen
SEC506: Securing Linux/Unix
Instructor: Hal Pomeranz
SEC511: Continuous Monitoring and Security Operations
Instructor: Eric Conrad
SEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Pieter Danhieux
SEC550: Active Defense, Offensive Countermeasures and Cyber Deception
Instructor: Bryce Galbraith
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
NewSEC573: Automating Information Security with Python
Instructor: Mark Baggett
SEC575: Mobile Device Security and Ethical Hacking
Instructor: Joshua Wright
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses
Instructor: Larry Pesce
NewSEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
Instructor: Adrien de Beaupre
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: Stephen Sims
SEC760: Advanced Exploit Development for Penetration Testers
Instructor: Jake Williams
FOR408: Windows Forensic Analysis
Instructor: Rob Lee
FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting
Instructor: Chad Tilbury
FOR518: Mac Forensic Analysis
Instructor: Sarah Edwards
FOR526: Advanced Memory Forensics & Threat Detection
Instructor: Alissa Torres
NewFOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
Instructor: Philip Hagen
FOR578: Cyber Threat Intelligence
Instructor: Robert M. Lee
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS Training Program for CISSP® Certification
Instructor: Seth Misenar
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
MGT514: IT Security Strategic Planning, Policy, and Leadership
Instructor: Frank Kim
WaitlistMGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
DEV522: Defending Web Applications Security Essentials
Instructor: Jason Lam
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: Clay Risenhoover
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
ICS410: ICS/SCADA Security Essentials
Instructor: Justin Searle
HOSTED: Physical Security Specialist - Full Comprehensive Edition
Instructor: The CORE Group
WaitlistCore NetWars Tournament
Instructor: Tim Medin
DFIR NetWars Tournament      
GSE Lab Examination
General Session - Welcome to SANS
Instructor: Eric Conrad
Quality not Quantity: Continuous Monitoring's Deadliest Events
Instructor: Eric Conrad
GIAC Program Presentation
Instructor: Jeff Frisk
Indicators of Compromise Ransomware TeslaCrypt Malware
Instructor: Kevin Kelly, Master's Degree Candidate
Securing Your Kids
Instructor: Lance Spitzner
Taking Control of Your Application Security
Instructor: Eric Johnson
Be the Cheatsheet. Know Memory.
Instructor: Alissa Torres
Learning Normal with the Kansa PowerShell Incident Response Framework
Instructor: Jason Simsay, Master's Degree Candidate
The Three C's to Building a Mature Awareness Program
Instructor: Lance Spitzner
Arming SMB's Against Ransomware Attacks
Instructor: Timothy Ashford, Master's Degree Candidate
Operating an ICS/SCADA Security Operations Center
Instructor: Robert M. Lee
The Tap House
Instructor: Philip Hagen
Impediments to Adoption of Two-Factor Authentication by Home End-Users
Instructor: Preston Ackerman, Master's Degree Candidate
Logs Unite! - Forensic Analysis of Apple Unified Logs
Instructor: Sarah Edwards
The End of Banking as We Know It: How Crypto Currencies and e-Payments are Breaking Up a Centuries-Old Monopoly
Instructor: G. Mark Hardy
Cyber-Hygiene and Standards of Care: Practical Defenses against Advanced Attacks
Instructor: James Tarala
Influence and Implementation
Instructor: Wesley Earnest, Master's Degree Candidate
You've Got Ransomeware! Managing the Legal Risk of Cyber Fraud
Instructor: Benjamin Wright
Mobile Application Assessment
Instructor: Chris Crowley
Prioritizing Your Security Program
Instructor: Keith Palmgren
SS7 - Teleco's Fallen Wall
Instructor: Hassan Mourad, Master's Degree Candidate
Breaking Next Next (Next?) Gen Security Software
Instructor: John Strand
Simple Approach to Access Control: Port Control and MAC Filtering
Instructor: William Knaffl, Master's Degree Candidate
The Internet of Things is Turning Against Us
Instructor: Johannes Ullrich, Ph.D.
Database Activity Monitoring (DAM): How It Works, And What You Need To Know To Implement It
Instructor: Charles Brodsky, Master's Degree Candidate
Instructor: Adrien de Beaupre
Ten Tenets of CISO Success
Instructor: Frank Kim