NewSEC504: Hacker Tools, Techniques, Exploits, and Incident Handling | | | | | | | | |
NewSEC503: Intrusion Detection In-Depth | | | | | | | | |
NewFOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting | | | | | | | | |
NewSEC617: Wireless Penetration Testing and Ethical Hacking | | | | | | | | |
NewSEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques | | | | | | | | |
NewSEC455: SIEM Design & Implementation | | | | | | | | |
NewSEC599: Defeating Advanced Adversaries - Implementing Kill Chain Defenses | | | | | | | | |
NewFOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response | | | | | | | | |
NewDEV540: Secure DevOps and Cloud Application Security | | | | | | | | |
WaitlistSEC401: Security Essentials Bootcamp Style | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | |
FOR500: Windows Forensic Analysis | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | |
MGT414: SANS Training Program for CISSP® Certification | | | | | | | | |
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | | | |
SEC505: Securing Windows and PowerShell Automation | | | | | | | | |
AUD507: Auditing & Monitoring Networks, Perimeters & Systems | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | |
SEC301: Introduction to Cyber Security | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | |
SEC440: Critical Security Controls: Planning, Implementing, and Auditing | | | | | | | | |
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | | | |
MGT514: Security Strategic Planning, Policy, and Leadership | | | | | | | | |
MGT433: SANS Security Awareness: How to Build, Maintain, and Measure a Mature Awareness Program | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | |
SEC511: Continuous Monitoring and Security Operations | | | | | | | | |
Sold OutSEC545: Cloud Security Architecture and Operations | | | | | | | | |
WaitlistSEC555: SIEM with Tactical Analytics | | | | | | | | |
WaitlistSEC564: Red Team Operations and Threat Emulation | | | | | | | | |
SEC573: Automating Information Security with Python | | | | | | | | |
SEC760: Advanced Exploit Development for Penetration Testers | | | | | | | | |
FOR518: Mac and iOS Forensic Analysis and Incident Response | | | | | | | | |
FOR578: Cyber Threat Intelligence | | | | | | | | |
FOR585: Advanced Smartphone Forensics | | | | | | | | |
MGT415: A Practical Introduction to Cyber Security Risk Management | | | | | | | | |
HOSTED: Physical Security Specialist - Full Comprehensive Edition | | | | | | | | |
Core NetWars Tournament | | | | | | | | |
Cyber Defense NetWars Tournament | | | | | | | | |
DFIR NetWars Tournament | | | | | | | | |
An Evening of Hacking the Internet of Things (IoT) Instructor: James Lyne, Stephen Sims, Jim Shewmaker, and Guests | | | | | | | | |
APAC Student Reception at SANS 2018 | | | | | | | | |
Coffee & Donuts with the Graduate Students | | | | | | | | |
Container Intrusions: Do You Even IDS Instructor: Alfredo Hickman | | | | | | | | |
Cyber-Bullying and Sexting Protocols In Our Schools With Appropriate Consequences Instructor: Detective Richard Wistocki (Ret.) | | | | | | | | |
Defeating Advanced Adversaries - Dismantling their attacks one step at a time Instructor: Erik Van Buggenhout | | | | | | | | |
Demisto Security Orchestration Workshop - Contest for Best Playbook Instructor: Sponsored by Demisto | | | | | | | | |
General Session - Welcome to SANS Instructor: Bryan Simon | | | | | | | | |
GIAC Information Reception Instructor: Jeff Frisk | | | | | | | | |
Hacking Dumberly, Just Like the Bad Guys Instructor: Tim Medin and Derek Banks | | | | | | | | |
Infosec Rock Star: Geek Will Only Get You So Far Instructor: Ted Demopoulos | | | | | | | | |
Let's Go Hunting Bad Guys Instructor: John Strand | | | | | | | | |
Leverage Risk Focused Teams to Strengthen Resilience against Cyber Risk Instructor: David Bishop, Master's Degree Candidate | | | | | | | | |
Malware Vaccination: Its Potential and Limitations Instructor: Lenny Zeltser | | | | | | | | |
Responding to the European Union's new General Data Protection Regulation Instructor: Ben Wright | | | | | | | | |
Secure DevOps: A Puma's Tail Instructor: Aaron Cure | | | | | | | | |
Securing Your Kids Instructor: Lance Spitzner | | | | | | | | |
SIEM Field Guide Instructor: Peter Szczepankiewicz | | | | | | | | |
So, You Wanna be a Pentester? Instructor: Adrien de Beaupre | | | | | | | | |
Speaking to the Board on Cybersecurity Instructor: Lance Spitzner | | | | | | | | |
Stuck in the Box, a SIEM's Tale Instructor: Justin Henderson | | | | | | | | |
The 14 Absolute Truths of Security Instructor: Keith Palmgren | | | | | | | | |
The Seven Deadly Sins of Incident Response Instructor: Jake Williams | | | | | | | | |
The State of Honeypots: Understanding the Use of Honey Technologies Today Instructor: Andrea Dominguez | | | | | | | | |
Threat Hunting via Windows Event Logs Instructor: Eric Conrad | | | | | | | | |
Three Keys for SecDevOps Success Instructor: Frank Kim | | | | | | | | |