NewMGT415: A Practical Introduction to Risk Assessment | | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | | |
SEC504: Hacker Techniques, Exploits & Incident Handling | | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | | |
Sold OutFOR408: Computer Forensic Investigations - Windows In-Depth | | | | | | | | | |
WaitlistSEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | | |
WaitlistSEC503: Intrusion Detection In-Depth | | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | | |
Sold OutFOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | | |
Sold OutMGT414: SANS® +S™ Training Program for the CISSP® Certification Exam | | | | | | | | | |
FOR508: Advanced Computer Forensic Analysis and Incident Response | | | | | | | | | |
SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking | | | | | | | | | |
SEC505: Securing Windows and Resisting Malware | | | | | | | | | |
Sold OutAUD507: Auditing Networks, Perimeters, and Systems | | | | | | | | | |
WaitlistSEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | | |
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses | | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | | |
WaitlistSEC301: Intro to Information Security | | | | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | | |
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | | | | |
MGT514: IT Security Strategic Planning, Policy and Leadership | | | | | | | | | |
MGT433: Securing The Human: Building and Deploying an Effective Security Awareness Program | | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | | |
SEC546: IPv6 Essentials | | | | | | | | | |
WaitlistSEC642: Advanced Web App Penetration Testing and Ethical Hacking | | | | | | | | | |
Sold OutSEC573: Python for Penetration Testers | | | | | | | | | |
HOSTED: Physical Penetration Testing - Introduction | | | | | | | | | |
Core NetWars Tournament | | | | | | | | | |
IPv6 Summit Instructor: Staff | | | | | | | | | |
Active Defense, Crime and Punishment: New Tools to Find Bad People Instructor: John Strand | | | | | | | | | |
Automated Analysis of Android Malware Instructor: Jim Clausing | | | | | | | | | |
Avoiding Cyberterrorism Threats Inside Hydraulic Power Generation Plants Instructor: Manuel Humberto Santander Palaez | | | | | | | | | |
Defensive Reading: Understanding Online News Instructor: Richard Porter | | | | | | | | | |
Evolving Threats Instructor: Paul A. Henry | | | | | | | | | |
Fiber Channel - Your **Other** Datacenter Network Instructor: Rob VandenBrink | | | | | | | | | |
General Session - Welcome to SANS Instructor: Dr. Eric Cole | | | | | | | | | |
GIAC Program Overview Instructor: Jeff Frisk | | | | | | | | | |
Introducing the CompTIA CASP Exam Instructor: Eric Conrad and Seth Misenar | | | | | | | | | |
Investigating Employees: BYOD, COPE, and Online/Social Media Instructor: Ben Wright | | | | | | | | | |
Memory Analysis with Volatility Instructor: Russ McRee | | | | | | | | | |
Offensive Digital Forensics Instructor: Alissa Torres | | | | | | | | | |
Online Training Social Hour | | | | | | | | | |
SANS Technology Institute Open House Instructor: Toby R. Gouker - Provost | | | | | | | | | |
Securing the Human Instructor: Lance Spitzner | | | | | | | | | |
Securing the Human - Phishing Launch | | | | | | | | | |
Securing the Kids Instructor: Lance Spitzner | | | | | | | | | |
Security Outliers: Special Operations Edition Instructor: Gal Shpantzer | | | | | | | | | |
State of the Internet Panel Discussion Instructor: Moderators: Dr. Johannes Ullrich, ISC Director and Marcus Sachs, ISC Director Emeritus | | | | | | | | | |
Windows Exploratory Surgery with Process Hacker Instructor: Jason Fossen | | | | | | | | | |
Women in Technology Meet and Greet | | | | | | | | | |