NewSEC504: Hacker Tools, Techniques, Exploits and Incident Handling | | | | | | | | |
NewSEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | |
NewSEC575: Mobile Device Security and Ethical Hacking | | | | | | | | |
NewMGT415: A Practical Introduction to Cyber Security Risk Management | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | |
FOR408: Windows Forensic Analysis | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | |
WaitlistSEC503: Intrusion Detection In-Depth | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | |
MGT414: SANS Training Program for CISSP® Certification | | | | | | | | |
FOR508: Advanced Digital Forensics and Incident Response | | | | | | | | |
WaitlistSEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | | | |
SEC505: Securing Windows and PowerShell Automation | | | | | | | | |
AUD507: Auditing & Monitoring Networks, Perimeters & Systems | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | |
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses | | | | | | | | |
SEC301: Intro to Information Security | | | | | | | | |
WaitlistSEC522: Defending Web Applications Security Essentials | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | |
AUD440: Critical Security Controls: Planning, Implementing, and Auditing | | | | | | | | |
Sold OutMGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | | | |
MGT514: IT Security Strategic Planning, Policy, and Leadership | | | | | | | | |
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | |
SEC642: Advanced Web App Penetration Testing and Ethical Hacking | | | | | | | | |
SEC511: Continuous Monitoring and Security Operations | | | | | | | | |
SEC562: CyberCity Hands-on Kinetic Cyber Range Exercise | | | | | | | | |
SEC760: Advanced Exploit Development for Penetration Testers | | | | | | | | |
FOR572: Advanced Network Forensics and Analysis | | | | | | | | |
WaitlistFOR578: Cyber Threat Intelligence | | | | | | | | |
FOR585: Advanced Smartphone Forensics | | | | | | | | |
WaitlistICS410: ICS/SCADA Security Essentials | | | | | | | | |
ICS515: ICS Active Defense and Incident Response | | | | | | | | |
HOSTED: Health Care Security Essentials | | | | | | | | |
Core NetWars Tournament | | | | | | | | |
DFIR NetWars Tournament | | | | | | | | |
$HOME Sweet $HOME Instructor: Xavier Mertens, ISC Handler | | | | | | | | |
CISO Hot Topic: Communicating to and Influencing CEOs and Boards of Directors: What Works and What to Avoid Instructor: John Pescatore & Alan Paller | | | | | | | | |
CISO Success Strategies Instructor: Frank Kim | | | | | | | | |
Continuous Opportunity: DevOps & Security Instructor: Ben Allen | | | | | | | | |
Data Mining Malware Like a Boss Instructor: John Bambenek, ISC Handler | | | | | | | | |
Digital Investigations: Leveraging the Multitude of Records Instructor: Ben Wright | | | | | | | | |
Executing an Active Defense Strategy in an ICS/SCADA Network Instructor: Robert M. Lee | | | | | | | | |
Exploit Kits and Indicators of Compromise Instructor: Brad Duncan, ISC Handler | | | | | | | | |
Fire in the Hole: ICS Security Case Studies Instructor: Hosted by Derek Harp | | | | | | | | |
General Session - Welcome to SANS Instructor: Dr. Johannes Ullrich | | | | | | | | |
GIAC Program Presentation Instructor: Jeff Frisk | | | | | | | | |
Going Mobile: Are your apps putting you at risk? Instructor: Eric Johnson | | | | | | | | |
Homegrown AppSec: How to build your team from the inside Instructor: Frank Kim & Eric Johnson | | | | | | | | |
How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats... Instructor: Bryce Galbraith and John Strand | | | | | | | | |
How to Commit Card Fraud Instructor: G. Mark Hardy | | | | | | | | |
How to Make Sense of IOCs (or Automate it or Lose it!) Instructor: Pedro Bueno, ISC Handler | | | | | | | | |
Managing Large-Scale Incident Response Instructor: Kevin Liston, ISC Handler | | | | | | | | |
Penetration Testing Mobile Banking Applications Instructor: Bojan Zdrnja, ISC Handler | | | | | | | | |
Pentest Apocalypse Instructor: Beau Bullock | | | | | | | | |
Playing with SCADA's Modbus Protocol Instructor: Justin Searle | | | | | | | | |
Preparing for a PCI DSS Security Breach Instructor: Christian Moldes - Master's Degree Candidate | | | | | | | | |
SANS Technology Institute Breakfast Reception | | | | | | | | |
Securing Your Kids Instructor: Lance Spitzner | | | | | | | | |
Security Awareness: Understanding and Managing Your Top Seven Human Risks Instructor: Lance Spitzner | | | | | | | | |
Smartphone and Network Forensics Goes Together Like Peas and Carrots Instructor: Heather Mahalik and Phil Hagen | | | | | | | | |
State of the Internet Panel Discussion Instructor: Dr. Johannes Ullrich, ISC Director and Marcus Sachs, ISC Director Emeritus | | | | | | | | |
Success Rates for Client Side Vulnerabilities Instructor: Jonathan Risto - Master's Degree Candidate | | | | | | | | |
The iOS of Sauron - How iOS Tracks Everything You Do Instructor: Sarah Edwards | | | | | | | | |
The Nightmare on Cryptville Street: 20 Pills for a Night of Sleep Instructor: Oleg Bogomolniy - Master's Degree Candidate | | | | | | | | |
Women's CONNECT Event Instructor: Hosted by SANS COINS program and ISSA WIS SIG | | | | | | | | |
Writing Tech: Stories from the Field Instructor: Joshua Wright | | | | | | | | |