Reward Yourself! Get a $400 Amazon Gift Card with Qualifying OnDemand Course Purchase - Register Today!


Washington, DC | Sat, Jun 11 - Sat, Jun 18, 2016
This event is over,
but there are more training opportunities.

Sa 11Su 12Mo 13Tu 14We 15Th 16Fr 17Sa 18
NewSEC504: Hacker Tools, Techniques, Exploits and Incident Handling
Instructor: John Strand
NewSEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
NewSEC575: Mobile Device Security and Ethical Hacking  
NewMGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
SEC401: Security Essentials Bootcamp Style
Instructor: Jonathan Ham
FOR408: Windows Forensic Analysis
Instructor: Chad Tilbury
SEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Eric Conrad
WaitlistSEC503: Intrusion Detection In-Depth  
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS Training Program for CISSP® Certification
Instructor: Paul A. Henry
FOR508: Advanced Digital Forensics and Incident Response
Instructor: Rob Lee
WaitlistSEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: James Lyne
SEC505: Securing Windows and PowerShell Automation
Instructor: Jason Fossen
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: David Hoelzer
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Bryan Simon
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses
Instructor: Larry Pesce
SEC301: Intro to Information Security
Instructor: Keith Palmgren
WaitlistSEC522: Defending Web Applications Security Essentials
Instructor: Jason Lam
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
AUD440: Critical Security Controls: Planning, Implementing, and Auditing
Instructor: Randy Marchany
Sold OutMGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
MGT514: IT Security Strategic Planning, Policy, and Leadership
Instructor: Frank Kim
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Eric Conrad
SEC642: Advanced Web App Penetration Testing and Ethical Hacking
Instructor: Justin Searle
SEC511: Continuous Monitoring and Security Operations
Instructor: Seth Misenar
SEC562: CyberCity Hands-on Kinetic Cyber Range Exercise
Instructor: Tim Medin
SEC760: Advanced Exploit Development for Penetration Testers
Instructor: Stephen Sims
FOR572: Advanced Network Forensics and Analysis
Instructor: Philip Hagen
WaitlistFOR578: Cyber Threat Intelligence
Instructor: Jake Williams
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
WaitlistICS410: ICS/SCADA Security Essentials
Instructor: Eric Cornelius
ICS515: ICS Active Defense and Incident Response   
HOSTED: Health Care Security Essentials
Instructor: Greg Porter
Core NetWars Tournament
Instructor: Jeff McJunkin
DFIR NetWars Tournament      
Instructor: Xavier Mertens, ISC Handler
CISO Hot Topic: Communicating to and Influencing CEOs and Boards of Directors: What Works and What to Avoid
Instructor: John Pescatore & Alan Paller
CISO Success Strategies
Instructor: Frank Kim
Continuous Opportunity: DevOps & Security
Instructor: Ben Allen
Data Mining Malware Like a Boss
Instructor: John Bambenek, ISC Handler
Digital Investigations: Leveraging the Multitude of Records
Instructor: Ben Wright
Executing an Active Defense Strategy in an ICS/SCADA Network
Instructor: Robert M. Lee
Exploit Kits and Indicators of Compromise
Instructor: Brad Duncan, ISC Handler
Fire in the Hole: ICS Security Case Studies
Instructor: Hosted by Derek Harp
General Session - Welcome to SANS
Instructor: Dr. Johannes Ullrich
GIAC Program Presentation
Instructor: Jeff Frisk
Going Mobile: Are your apps putting you at risk?
Instructor: Eric Johnson
Homegrown AppSec: How to build your team from the inside
Instructor: Frank Kim & Eric Johnson
How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...
Instructor: Bryce Galbraith and John Strand
How to Commit Card Fraud
Instructor: G. Mark Hardy
How to Make Sense of IOCs (or Automate it or Lose it!)
Instructor: Pedro Bueno, ISC Handler
Managing Large-Scale Incident Response
Instructor: Kevin Liston, ISC Handler
Penetration Testing Mobile Banking Applications
Instructor: Bojan Zdrnja, ISC Handler
Pentest Apocalypse
Instructor: Beau Bullock
Playing with SCADA's Modbus Protocol
Instructor: Justin Searle
Preparing for a PCI DSS Security Breach
Instructor: Christian Moldes - Master's Degree Candidate
SANS Technology Institute Breakfast Reception
Securing Your Kids
Instructor: Lance Spitzner
Security Awareness: Understanding and Managing Your Top Seven Human Risks
Instructor: Lance Spitzner
Smartphone and Network Forensics Goes Together Like Peas and Carrots
Instructor: Heather Mahalik and Phil Hagen
State of the Internet Panel Discussion
Instructor: Dr. Johannes Ullrich, ISC Director and Marcus Sachs, ISC Director Emeritus
Success Rates for Client Side Vulnerabilities
Instructor: Jonathan Risto - Master's Degree Candidate
The iOS of Sauron - How iOS Tracks Everything You Do
Instructor: Sarah Edwards
The Nightmare on Cryptville Street: 20 Pills for a Night of Sleep
Instructor: Oleg Bogomolniy - Master's Degree Candidate
Women's CONNECT Event
Instructor: Hosted by SANS COINS program and ISSA WIS SIG
Writing Tech: Stories from the Field
Instructor: Joshua Wright