SEC301: Intro to Information Security | | | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | | | |
WaitlistSEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | | | |
SEC503: Intrusion Detection In-Depth | | | | | | | | | | |
SEC504: Hacker Techniques, Exploits & Incident Handling | | | | | | | | | | |
SEC505: Securing Windows with the Critical Security Controls | | | | | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | | | | | |
Sold OutSEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | | | |
SEC546: IPv6 Essentials | | | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | | | |
SEC573: Python for Penetration Testers | | | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | | | |
SEC642: Advanced Web App Penetration Testing and Ethical Hacking | | | | | | | | | | |
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | | | | | |
FOR408: Windows Forensic Analysis | | | | | | | | | | |
FOR508: Advanced Computer Forensic Analysis and Incident Response | | | | | | | | | | |
Sold OutFOR572: Advanced Network Forensics and Analysis | | | | | | | | | | |
NewFOR585: Advanced Smartphone Forensics | | | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | | | |
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam | | | | | | | | | | |
MGT415: A Practical Introduction to Risk Assessment | | | | | | | | | | |
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program | | | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | | | |
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | | | | | |
AUD507: Auditing Networks, Perimeters, and Systems | | | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | | | |
ICS410: ICS/SCADA Security Essentials | | | | | | | | | | |
HOSTED: Onapsis: Securing SAP Platforms - Hands-on Security Techniques to Protect Business-Critical Infrastructure from Cyber-attacks | | | | | | | | | | |
HOSTED: Physical Penetration Testing - Introduction | | | | | | | | | | |
WaitlistCore NetWars Tournament | | | | | | | | | | |
WaitlistDFIR NetWars Tournament | | | | | | | | | | |
Creating a Covert Channel in Wifi Instructor: Ronald Hamann | | | | | | | | | | |
An Introduction to PowerShell for Security Assessments Instructor: James Tarala | | | | | | | | | | |
Avoiding Cyberterrorism Threats Inside Electrical Substations Instructor: Manuel Humberto Santander Peláez | | | | | | | | | | |
Bust a Cap in a Web App With ZAP Instructor: Adrien de Beaupre | | | | | | | | | | |
C3CM – Defeating the Command, Control, and Communications of Digital Assailants Instructor: Russ McRee | | | | | | | | | | |
Consulting from Virtual Island Instructor: Rob VandenBrink | | | | | | | | | | |
General Session - Welcome to SANS Instructor: Johannes Ullrich | | | | | | | | | | |
GIAC Program Overview Instructor: Jeff Frisk | | | | | | | | | | |
How to Spy on your Employees with Memory Forensics Instructor: Alissa Torres | | | | | | | | | | |
Online Training Reception | | | | | | | | | | |
Penetration Testing Corporate Mobile Applications and BYOD Environments Instructor: Dmitry Dessiatnikov | | | | | | | | | | |
SANS Technology Institute Open House Instructor: William Lockhart | | | | | | | | | | |
Securing The Kids Instructor: Lance Spitzner | | | | | | | | | | |
Security Awareness Metrics: Measuring Human Behavior Instructor: Lance Spitzner | | | | | | | | | | |
Setting up Splunk for Event Correlation in Your Home Lab Instructor: Aron Warren - Master's Degree Candidate | | | | | | | | | | |
State of the Internet Panel Discussion Instructor: Dr. Johannes Ullrich, ISC Director and Marcus Sachs, ISC Director Emeritus | | | | | | | | | | |
The "Insider Threat" Revised: Crime, Understanding, and Prediction Instructor: Richard Porter | | | | | | | | | | |