Last week to get a GIAC Certification Attempt Included with Online Training - Ends Soon!


Baltimore, MD | Sat, Jun 13 - Sat, Jun 20, 2015
This event is over,
but there are more training opportunities.

Sa 13Su 14Mo 15Tu 16We 17Th 18Fr 19Sa 20
NewSEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Eric Conrad
NewSEC301: Intro to Information Security
Instructor: Keith Palmgren
NewMGT535: Incident Response Team Management
Instructor: Alissa Torres
NewSEC511: Continuous Monitoring and Security Operations
Instructor: Seth Misenar
NewSEC562: CyberCity Hands-on Kinetic Cyber Range Exercise
Instructor: Tim Medin
SEC401: Security Essentials Bootcamp Style
Instructor: Dr. Eric Cole
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
Instructor: John Strand
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
FOR408: Windows Forensic Analysis
Instructor: Rob Lee
SEC503: Intrusion Detection In-Depth
Instructor: Mike Poor
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS Training Program for CISSP® Certification
Instructor: Jonathan Ham
FOR508: Advanced Digital Forensics and Incident Response
Instructor: Chad Tilbury
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: James Lyne
SEC505: Securing Windows with PowerShell and the Critical Security Controls
Instructor: Jason Fossen
SEC579: Virtualization and Private Cloud Security
Instructor: Dave Shackleford
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: David Hoelzer
SEC501: Advanced Security Essentials - Enterprise Defender  
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
WaitlistSEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses
Instructor: Larry Pesce
DEV522: Defending Web Applications Security Essentials
Instructor: Jason Lam
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
WaitlistSEC506: Securing Linux/Unix
Instructor: Hal Pomeranz
DEV544: Secure Coding in .NET: Developing Defensible Applications
Instructors: Eric Johnson, Aaron Cure
WaitlistMGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
SEC524: Cloud Security Fundamentals
Instructor: Dave Shackleford
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Eric Conrad
SEC546: IPv6 Essentials      
SEC642: Advanced Web App Penetration Testing and Ethical Hacking
Instructor: Justin Searle
FOR526: Memory Forensics In-Depth
Instructor: Jake Williams
SEC760: Advanced Exploit Development for Penetration Testers
Instructor: Stephen Sims
FOR572: Advanced Network Forensics and Analysis
Instructor: Philip Hagen
Sold OutFOR578: Cyber Threat Intelligence      
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
MGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
ICS410: ICS/SCADA Security Essentials
Instructor: Graham Speake
Core NetWars Experience
Instructor: Jeff McJunkin
DFIR NetWars Tournament
Instructors: Rob Lee, Chad Tilbury
HOSTED: Physical Penetration Testing
Instructor: The CORE Group
Faster Than a Speeding Bullet: Can Geolocation Find Supervillains in Your Network?
Instructor: Tim Collyer - Master's Degree Candidate
Insider Threat: The Enemy Within
Instructor: Doug Thomas and Dr. Eric Cole
"Network Security as Counterinsurgency" Replacing The Art of War with FM 3-24
Instructor: Kevin Liston
A Special Reception for Cyber Leaders & Application Security Professionals
Attacks by BroBot against the US Financial Markets
Instructor: Donald Smith
Bueller... Bueller...: Smartphone Forensics Moves Fast. Stay Current or Miss Evidence.
Instructor: Heather Mahalik
Continuous Monitoring and Real-World Analysis
Instructor: Seth Misenar
Creating a Baseline of Process Activity for Memory Forensics
Instructor: Gordon Fraser - Master's Degree Candidate
Cyber Counter Intelligence and Deception: Toward Adaptive Defense
Instructor: Gadi Evron
Debunking the Complex Password Myth
Instructor: Keith Palmgren
Defending Control Systems in an Enterprise Environment
Instructor: Robert M. Lee
Enterprise PowerShell for Remote Security Assessment
Instructor: James Tarala
Evolving Threats
Instructor: Paul A. Henry
General Session - Welcome to SANS
Instructor: Johannes Ullrich
GIAC Program Overview
Instructor: Jeff Frisk
How to Run Linux Malware Analysis Apps as Docker Containers
Instructor: Lenny Zeltser
Making Awareness Stick
Instructor: Lance Spitzner
Offensive Countermeasures, Active Defenses, and Internet Tough Guys
Instructor: John Strand
Online Training Baseball Bash
Outsharing the Bad Guys. How to get involved with the InternetStorm Center
Instructor: Dr. Johannes Ullrich, ISC Director
Practical Attack Detection using Big Data, Semantics, and Kill Chains
Instructor: Brian Nafziger - Master's Degree Candidate
Registration Welcome Reception
SANS Technology Institute Information Session
Instructor: Bill Lockhart
Securing The Kids
Instructor: Lance Spitzner
Security Visibility in the Enterprise
Instructor: Jim Hendrick - Master's Degree Candidate
Software Defined Networking / Attacker Defined Networking
Instructor: Rob Vandenbrink
State of the Internet Panel Discussion
Instructor: Dr. Johannes Ullrich, ISC Director and Marcus Sachs, ISC Director Emeritus
The 13 Absolute Truths of Security
Instructor: Keith Palmgren
The Spy with a License to Kill
Instructor: Matthew Hosburgh - Master's Degree Candidate
The State of the Takedown: Disrupting Online Cybercrime
Instructor: John Bambenek
Unconventional Linux Incident Response
Instructor: Tom Webb
Windows Exploratory Surgery with Process Hacker
Instructor: Jason Fossen
Women in Technology Meet and Greet