Top Instructors Share Their Expertise ONLINE at SANS - Special Offers Available NOW!


Washington, DC | Sat, Jul 22 - Sat, Jul 29, 2017
This event is over,
but there are more training opportunities.

Sa 22Su 23Mo 24Tu 25We 26Th 27Fr 28Sa 29
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Instructor: John Strand
SEC503: Intrusion Detection In-Depth
Instructor: Jonathan Ham
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
SEC573: Automating Information Security with Python
Instructor: Mark Baggett
FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
Instructor: Philip Hagen
DEV534: Secure DevOps: A Practical Introduction
Instructor: Frank Kim
SEC401: Security Essentials Bootcamp Style
Instructor: Bryan Simon
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
FOR500: Windows Forensic Analysis
Instructor: Rob Lee
SEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Seth Misenar
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: Ted Demopoulos
MGT414: SANS Training Program for CISSP® Certification
Instructor: David R. Miller
FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting
Instructor: Chad Tilbury
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: Tim Medin
SEC505: Securing Windows and PowerShell Automation
Instructor: Jason Fossen
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: Clay Risenhoover
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
SEC575: Mobile Device Security and Ethical Hacking  
SEC301: Intro to Information Security
Instructor: Keith Palmgren
SEC522: Defending Web Applications Security Essentials
Instructor: Jason Lam
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
AUD440: Critical Security Controls: Planning, Implementing, and Auditing
Instructor: Randy Marchany
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
MGT514: IT Security Strategic Planning, Policy, and Leadership
Instructor: Frank Kim
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
SEC580: Metasploit Kung Fu for Enterprise Pen Testing      
SEC546: IPv6 Essentials      
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
Instructor: Adrien de Beaupre
FOR526: Advanced Memory Forensics & Threat Detection
Instructor: Alissa Torres
SEC511: Continuous Monitoring and Security Operations
Instructor: Eric Conrad
FOR578: Cyber Threat Intelligence
Instructor: Jake Williams
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
MGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
ICS410: ICS/SCADA Security Essentials
Instructor: Eric Cornelius
Core NetWars Tournament
Instructors: Jeff McJunkin, Tim Medin
Cyber Defense NetWars Tournament      
DFIR NetWars Tournament      
5 Key Steps for Building an AppSec Program
Instructor: Frank Kim & Eric Johnson
A Hunting We Will Go....
Instructor: John Strand
Auto-Nuke it from Orbit: A Framework for Critical Security Control Automation
Instructor: Jeremiah Hainly, Master's Degree Candidate
Coffee & Donuts with the Graduate School
Defense Against the Dark Arts 12b: Defending Linux/Unix Against the Ransomware Threat
Instructor: David Kennel, Master's Degree Candidate
Dos-No-More - An Automation Toolset for Upstream Mitigation of DOS and DDOS Attacks
Instructor: Rob Vandenbrink, ISC Handler
Espionage, Influence Operations and Political Breaches: What Do the High Profile Attacks Teach Us About Enterprise Security
Instructor: John Bambenek, ISC Handler
Evolving Threats
Instructor: Paul Henry
Fun With NetFlow - What Are You Missing?
Instructor: Lorna Hutcheson, ISC Handler
General Session - Welcome to SANS
Instructor: Johannes Ullrich
GIAC Program Presentation
Instructor: Jeff Frisk
Infosec Rock Star: Geek Will Only Get You So Far
Instructor: Ted Demopoulos
IR Awakens
Instructor: Tom Webb, ISC Handler
Making Sense of the Critical Security Controls in the Cloud
Instructor: Eric Johnson
Malware Analysis for Incident Responders: Getting Started
Instructor: Lenny Zeltser
Offensive Digital Forensics
Instructor: Alissa Torres
Peas and Carrots
Instructor: Heather Mahalik & Philip Hagen
Performing Cyber Threat Intelligence in Power Infrastructure
Instructor: Manuel Humberto Santander Palaez, ISC Handler
Prioritizing Your Security Program
Instructor: Keith Palmgren
Pwning NoSQL Applications for Fun and Profit
Instructor: Bojan Zdrnja, ISC Handler
Quality not Quantity: Continuous Monitoring's Deadliest Events
Instructor: Eric Conrad
SANS Technology Institute Commencement
Securing Your Kids
Instructor: Lance Spitzner
So, You Wanna be a Pentester?
Instructor: Adrien de Beaupre
State of the Internet Panel Discussion
Instructor: ISC Handlers
Ten Tenets of CISO Success
Instructor: Frank Kim
The Three C's to Building a Mature Awareness Program
Instructor: Lance Spitzner
Three Keys to Mobile Security: Are You Doing Everything You Can to Protect Your Apps?
Instructor: Gregory Leonard
Using Security Onion to Review Suspicious Network Traffic
Instructor: Brad Duncan, ISC Handler
Women's CONNECT Event
Instructor: Hosted by SANS COINS program and ISSA WIS SIG
You've Got Ransomware! Managing the Legal Risk of Cyber Fraud
Instructor: Benjamin Wright