NewSEC301: Intro to Information Security | | | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | | | |
SEC503: Intrusion Detection In-Depth | | | | | | | | | | |
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling | | | | | | | | | | |
SEC505: Securing Windows with PowerShell and the Critical Security Controls | | | | | | | | | | |
NewSEC511: Continuous Monitoring and Security Operations | | | | | | | | | | |
SEC524: Cloud Security Fundamentals | | | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | | | |
FOR408: Windows Forensic Analysis | | | | | | | | | | |
FOR508: Advanced Digital Forensics and Incident Response | | | | | | | | | | |
NewFOR518: Mac Forensic Analysis | | | | | | | | | | |
Sold OutFOR578: Cyber Threat Intelligence | | | | | | | | | | |
FOR585: Advanced Smartphone Forensics | | | | | | | | | | |
MGT414: SANS Training Program for CISSP® Certification | | | | | | | | | | |
MGT415: A Practical Introduction to Risk Assessment | | | | | | | | | | |
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program | | | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | | | |
DEV522: Defending Web Applications Security Essentials | | | | | | | | | | |
AUD440: Critical Security Controls: Planning, Implementing and Auditing | | | | | | | | | | |
ICS410: ICS/SCADA Security Essentials | | | | | | | | | | |
Core NetWars Experience | | | | | | | | | | |
DFIR NetWars Tournament | | | | | | | | | | |
Debunking the Complex Password Myth Instructor: Keith Palmgren | | | | | | | | | | |
Emerging Trends in Cybersecurity 2015 Instructor: John Pescatore | | | | | | | | | | |
Emerging Trends in DFIR- Lightning Talks Instructor: Rob Lee, Chad Tilbury, Heather Mahalik, Paul Henry, and Sarah Edwards | | | | | | | | | | |
Emerging Trends in Pen Testing Instructor: Panelists include John Strand with Eric Conrad, Chris Crowley, and Mike Murr | | | | | | | | | | |
Enterprise PowerShell for Remote Security Assessment Instructor: James Tarala | | | | | | | | | | |
Everything They Told Me About Security Was Wrong Instructor: John Strand | | | | | | | | | | |
General Session- Welcome to SANS Instructor: Rob Lee | | | | | | | | | | |
GIAC Office Hours | | | | | | | | | | |
GIAC Program Overview Instructor: Jeff Frisk | | | | | | | | | | |
Hunt Teaming Instructor: Justin Henderson | | | | | | | | | | |
SOC and Continuous Monitoring Instructor: Seth Misenar and Eric Conrad | | | | | | | | | | |
The 13 Absolute Truths of Security Instructor: Keith Palmgren | | | | | | | | | | |
The Future of Cyber Defense Instructor: Paul Henry | | | | | | | | | | |
The Internet of Evil Things Instructor: Johannes B. Ullrich, Ph.D. | | | | | | | | | | |
Why Our Defenses Are Failing Us. One Click Is All It Takes... Instructor: Bryce Galbraith | | | | | | | | | | |
Windows Exploratory Surgery with Process Hacker Instructor: Jason Fossen | | | | | | | | | | |
Women in Technology Meet and Greet | | | | | | | | | | |