Do you have the skills needed to defeat cyber attackers? Register now for training in San Francisco.


Baltimore, MD | Sat, Jun 13 - Sat, Jun 20, 2015
This event is over,
but there are more training opportunities.

Sa 13Su 14Mo 15Tu 16We 17Th 18Fr 19Sa 20
SEC524: Cloud Security Fundamentals
Instructor: Dave Shackleford
SEC546: IPv6 Essentials      
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Eric Conrad
Sold OutFOR578: Cyber Threat Intelligence      
MGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
HOSTED: Physical Penetration Testing
Instructor: The CORE Group
NewSEC301: Intro to Information Security
Instructor: Keith Palmgren
SEC401: Security Essentials Bootcamp Style
Instructor: Dr. Eric Cole
SEC501: Advanced Security Essentials - Enterprise Defender  
SEC503: Intrusion Detection In-Depth
Instructor: Mike Poor
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
Instructor: John Strand
SEC505: Securing Windows with PowerShell and the Critical Security Controls
Instructor: Jason Fossen
WaitlistSEC506: Securing Linux/Unix
Instructor: Hal Pomeranz
NewSEC511: Continuous Monitoring and Security Operations
Instructor: Seth Misenar
NewSEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Eric Conrad
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
NewSEC562: CyberCity Hands-on Kinetic Cyber Range Exercise
Instructor: Tim Medin
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
WaitlistSEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses
Instructor: Larry Pesce
SEC642: Advanced Web App Penetration Testing and Ethical Hacking
Instructor: Justin Searle
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: James Lyne
SEC760: Advanced Exploit Development for Penetration Testers
Instructor: Stephen Sims
FOR408: Windows Forensic Analysis
Instructor: Rob Lee
FOR508: Advanced Digital Forensics and Incident Response
Instructor: Chad Tilbury
FOR526: Advanced Memory Forensics & Threat Detection
Instructor: Jake Williams
FOR572: Advanced Network Forensics and Analysis
Instructor: Philip Hagen
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS Training Program for CISSP® Certification
Instructor: Jonathan Ham
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
WaitlistMGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
DEV522: Defending Web Applications Security Essentials
Instructor: Jason Lam
DEV544: Secure Coding in .NET: Developing Defensible Applications
Instructors: Aaron Cure, Eric Johnson
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: David Hoelzer
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
ICS410: ICS/SCADA Security Essentials
Instructor: Graham Speake
Core NetWars Experience
Instructor: Jeff McJunkin
DFIR NetWars Tournament
Instructors: Chad Tilbury, Rob Lee
Registration Welcome Reception
General Session - Welcome to SANS
Instructor: Johannes Ullrich
SANS Technology Institute Information Session
Instructor: Bill Lockhart
State of the Internet Panel Discussion
Instructor: Dr. Johannes Ullrich, ISC Director and Marcus Sachs, ISC Director Emeritus
Women in Technology Meet and Greet
A Special Reception for Cyber Leaders & Application Security Professionals
GIAC Program Overview
Instructor: Jeff Frisk
Online Training Baseball Bash
Faster Than a Speeding Bullet: Can Geolocation Find Supervillains in Your Network?
Instructor: Tim Collyer - Master's Degree Candidate
How to Run Linux Malware Analysis Apps as Docker Containers
Instructor: Lenny Zeltser
Making Awareness Stick
Instructor: Lance Spitzner
The 13 Absolute Truths of Security
Instructor: Keith Palmgren
The State of the Takedown: Disrupting Online Cybercrime
Instructor: John Bambenek
Insider Threat: The Enemy Within
Instructor: Doug Thomas and Dr. Eric Cole
Attacks by BroBot against the US Financial Markets
Instructor: Donald Smith
Debunking the Complex Password Myth
Instructor: Keith Palmgren
Enterprise PowerShell for Remote Security Assessment
Instructor: James Tarala
Practical Attack Detection using Big Data, Semantics, and Kill Chains
Instructor: Brian Nafziger - Master's Degree Candidate
Securing The Kids
Instructor: Lance Spitzner
"Network Security as Counterinsurgency" Replacing The Art of War with FM 3-24
Instructor: Kevin Liston
Bueller... Bueller...: Smartphone Forensics Moves Fast. Stay Current or Miss Evidence.
Instructor: Heather Mahalik
Security Visibility in the Enterprise
Instructor: Jim Hendrick - Master's Degree Candidate
Windows Exploratory Surgery with Process Hacker
Instructor: Jason Fossen
Creating a Baseline of Process Activity for Memory Forensics
Instructor: Gordon Fraser - Master's Degree Candidate
Evolving Threats
Instructor: Paul A. Henry
Offensive Countermeasures, Active Defenses, and Internet Tough Guys
Instructor: John Strand
Unconventional Linux Incident Response
Instructor: Tom Webb
Software Defined Networking / Attacker Defined Networking
Instructor: Rob Vandenbrink
The Spy with a License to Kill
Instructor: Matthew Hosburgh - Master's Degree Candidate
Cyber Counter Intelligence and Deception: Toward Adaptive Defense
Instructor: Gadi Evron
Outsharing the Bad Guys. How to get involved with the InternetStorm Center
Instructor: Dr. Johannes Ullrich, ISC Director
Continuous Monitoring and Real-World Analysis
Instructor: Seth Misenar
Defending Control Systems in an Enterprise Environment
Instructor: Robert M. Lee