Get a GIAC Certification Attempt Included or $350 Off with SANS Online Training!


Washington, DC | Sat, Jul 22 - Sat, Jul 29, 2017
This event is over,
but there are more training opportunities.

Sa 22Su 23Mo 24Tu 25We 26Th 27Fr 28Sa 29
NewSEC503: Intrusion Detection In-Depth
Instructor: Jonathan Ham
NewFOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
NewSEC579: Virtualization and Software-Defined Security
Instructor: Dave Shackleford
NewSEC573: Automating Information Security with Python
Instructor: Mark Baggett
NewFOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
Instructor: Philip Hagen
NewDEV531: Defending Mobile Applications Security Essentials
Instructor: Gregory Leonard
NewDEV534: Secure DevOps: A Practical Introduction
Instructor: Frank Kim
SEC401: Security Essentials Bootcamp Style
Instructor: Bryan Simon
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Instructor: John Strand
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
FOR500: Windows Forensic Analysis
Instructor: Rob Lee
SEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Seth Misenar
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: Ted Demopoulos
MGT414: SANS Training Program for CISSP® Certification
Instructor: David R. Miller
FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting
Instructor: Chad Tilbury
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: Tim Medin
SEC505: Securing Windows and PowerShell Automation
Instructor: Jason Fossen
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: Clay Risenhoover
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
SEC575: Mobile Device Security and Ethical Hacking  
SEC301: Intro to Information Security
Instructor: Keith Palmgren
DEV522: Defending Web Applications Security Essentials
Instructor: Jason Lam
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
DEV541: Secure Coding in Java/JEE: Developing Defensible Applications
Instructor: Gregory Leonard
AUD440: Critical Security Controls: Planning, Implementing, and Auditing
Instructor: Randy Marchany
SEC506: Securing Linux/Unix
Instructor: Hal Pomeranz
DEV544: Secure Coding in .NET: Developing Defensible Applications
Instructor: Eric Johnson
WaitlistMGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
WaitlistSEC524: Cloud Security Fundamentals
Instructor: Dave Shackleford
MGT514: IT Security Strategic Planning, Policy, and Leadership
Instructor: Frank Kim
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
SEC580: Metasploit Kung Fu for Enterprise Pen Testing      
SEC546: IPv6 Essentials      
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
Instructor: Adrien de Beaupre
MGT305: Technical Communication and Presentation Skills for Security Professionals
Instructor: Seth Misenar
WaitlistFOR526: Memory Forensics In-Depth
Instructor: Alissa Torres
SEC511: Continuous Monitoring and Security Operations
Instructor: Eric Conrad
SEC550: Active Defense, Offensive Countermeasures and Cyber Deception
Instructor: Bryce Galbraith
SEC561: Immersive Hands-on Hacking Techniques
Instructor: Kevin Fiscus
SEC567: Social Engineering for Penetration Testers
Instructor: Micah Hoffman
FOR578: Cyber Threat Intelligence
Instructor: Jake Williams
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
MGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
WaitlistMGT517: Managing Security Operations: Detection, Response, and Intelligence   
ICS410: ICS/SCADA Security Essentials
Instructor: Eric Cornelius
WaitlistCore NetWars Experience
Instructors: Jeff McJunkin, Tim Medin
Cyber Defense NetWars Tournament      
DFIR NetWars Tournament      
5 Key Steps for Building an AppSec Program
Instructor: Frank Kim & Eric Johnson
A Hunting We Will Go....
Instructor: John Strand
Auto-Nuke it from Orbit: A Framework for Critical Security Control Automation
Instructor: Jeremiah Hainly, Master's Degree Candidate
Coffee & Donuts with the Graduate School
Defense Against the Dark Arts 12b: Defending Linux/Unix Against the Ransomware Threat
Instructor: David Kennel, Master's Degree Candidate
Dos-No-More - An Automation Toolset for Upstream Mitigation of DOS and DDOS Attacks
Instructor: Rob Vandenbrink, ISC Handler
Espionage, Influence Operations and Political Breaches: What Do the High Profile Attacks Teach Us About Enterprise Security
Instructor: John Bambenek, ISC Handler
Evolving Threats
Instructor: Paul Henry
Fun With NetFlow - What Are You Missing?
Instructor: Lorna Hutcheson, ISC Handler
General Session - Welcome to SANS
Instructor: Johannes Ullrich
GIAC Program Presentation
Instructor: Jeff Frisk
Infosec Rock Star: Geek Will Only Get You So Far
Instructor: Ted Demopoulos
IR Awakens
Instructor: Tom Webb, ISC Handler
Making Sense of the Critical Security Controls in the Cloud
Instructor: Eric Johnson
Malware Analysis for Incident Responders: Getting Started
Instructor: Lenny Zeltser
Offensive Digital Forensics
Instructor: Alissa Torres
Peas and Carrots
Instructor: Heather Mahalik & Philip Hagen
Performing Cyber Threat Intelligence in Power Infrastructure
Instructor: Manuel Humberto Santander Palaez, ISC Handler
Prioritizing Your Security Program
Instructor: Keith Palmgren
Pwning NoSQL Applications for Fun and Profit
Instructor: Bojan Zdrnja, ISC Handler
Quality not Quantity: Continuous Monitoring's Deadliest Events
Instructor: Eric Conrad
SANS Technology Institute Commencement
Securing Your Kids
Instructor: Lance Spitzner
So, You Wanna be a Pentester?
Instructor: Adrien de Beaupre
State of the Internet Panel Discussion
Instructor: ISC Handlers
Ten Tenets of CISO Success
Instructor: Frank Kim
The Three C's to Building a Mature Awareness Program
Instructor: Lance Spitzner
Three Keys to Mobile Security: Are You Doing Everything You Can to Protect Your Apps?
Instructor: Gregory Leonard
Using Security Onion to Review Suspicious Network Traffic
Instructor: Brad Duncan, ISC Handler
Women's CONNECT Event
Instructor: Hosted by SANS COINS program and ISSA WIS SIG
You've Got Ransomware! Managing the Legal Risk of Cyber Fraud
Instructor: Benjamin Wright