3 Days left to get an iPad Pro with Smart Keyboard, Surface GO or $350 Off with Online Training

SANSFIRE 2018

Washington, DC | Sat, Jul 14 - Sat, Jul 21, 2018
This event is over,
but there are more training opportunities.

Course
Jul
Sa 14Su 15Mo 16Tu 17We 18Th 19Fr 20Sa 21
NewSEC455: SIEM Design & Implementation
Instructor: John Hubbard
      
NewSEC555: SIEM with Tactical Analytics  
SEC401: Security Essentials Bootcamp Style
Instructor: Bryan Simon
  
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Instructor: John Strand
  
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
  
FOR500: Windows Forensic Analysis
Instructor: Chad Tilbury
  
SEC542: Web App Penetration Testing and Ethical Hacking  
SEC503: Intrusion Detection In-Depth
Instructor: David Hoelzer
  
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
   
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
  
MGT414: SANS Training Program for CISSP® Certification
Instructor: David R. Miller
  
FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting
Instructor: Rob Lee
  
WaitlistSEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructors: Jake Williams, Tim Medin
  
SEC505: Securing Windows and PowerShell Automation
Instructor: Jason Fossen
  
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: Clay Risenhoover
  
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
  
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
   
WaitlistSEC617: Wireless Penetration Testing and Ethical Hacking
Instructor: James Leyte-Vidal
  
SEC575: Mobile Device Security and Ethical Hacking
Instructor: Joshua Wright
  
SEC301: Introduction to Cyber Security
Instructor: Keith Palmgren
   
WaitlistDEV522: Defending Web Applications Security Essentials
Instructor: Jason Lam
  
WaitlistLEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
   
WaitlistDEV541: Secure Coding in Java/JEE: Developing Defensible Applications
Instructor: Gregory Leonard
    
SEC440: Critical Security Controls: Planning, Implementing, and Auditing
Instructor: Russell Eubanks
      
SEC506: Securing Linux/Unix
Instructor: Hal Pomeranz
  
Sold OutMGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
  
MGT514: Security Strategic Planning, Policy, and Leadership
Instructor: Frank Kim
   
MGT433: SANS Security Awareness: How to Build, Maintain, and Measure a Mature Awareness Program
Instructor: Lance Spitzner
      
SEC580: Metasploit Kung Fu for Enterprise Pen Testing      
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
Instructor: Adrien de Beaupre
  
WaitlistSEC511: Continuous Monitoring and Security Operations
Instructor: Eric Conrad
  
WaitlistSEC530: Defensible Security Architecture
Instructor: Justin Henderson
  
Sold OutSEC545: Cloud Security Architecture and Operations
Instructor: Dave Shackleford
   
WaitlistSEC564: Red Team Operations and Threat Emulation
Instructor: Joe Vest
      
SEC567: Social Engineering for Penetration Testers
Instructor: Micah Hoffman
      
WaitlistSEC573: Automating Information Security with Python
Instructor: Mark Baggett
  
WaitlistSEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses  
WaitlistSEC760: Advanced Exploit Development for Penetration Testers
Instructor: Stephen Sims
  
WaitlistFOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
Instructor: Philip Hagen
  
WaitlistFOR578: Cyber Threat Intelligence
Instructor: Jake Williams
   
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
  
MGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
      
DEV534: Secure DevOps: A Practical Introduction
Instructor: Gregory Leonard
      
WaitlistICS410: ICS/SCADA Security Essentials   
WaitlistICS515: ICS Active Defense and Incident Response
Instructor: Robert M. Lee
   
WaitlistCore NetWars Experience      
WaitlistCyber Defense NetWars Tournament      
DFIR NetWars Tournament      
2FA Authentication in Mobile Applications: Challenges and Opportunities
Instructor: Bojan Zdrnja, ISC Handler
Blockchain: the New Digital Swiss Army Knife?
Instructor: G. Mark Hardy
Coffee & Donuts with the Graduate Students
Commitment Issues: Can You Really Trust What Your Tools Are Telling You?
Instructor: Heather Mahalik, Domenica Crognale
Defense Is Doable - Breaking The Cyber Kill Chain
Instructor: Erik Van Buggenhout & Stephen Sims
Detecting Penetration Testers on a Windows Network with Splunk
Instructor: Fred Speece
Dynamic Analysis and Reconstructing an Infection Chain
Instructor: Brad Duncan, ISC Handler
Exploring a P2P Transient Botnet - From Discovery to Enumeration
Instructor: Renato Marinho, ISC Handler
Full Packet Capture for the Masses
Instructor: Xavier Mertens, ISC Handler
General Session - Welcome to SANS
Instructor: Dr. Johannes Ullrich, ISC Director
GIAC Overview Presentation
Instructor: Jeff Frisk
Hacking Dumberly, Just Like the Bad Guys
Instructor: Tim Medin
How to Create/Share Indicators and SOC Metrics Efficiently
Instructor: Tom Webb, ISC Handler
Industrial Control System Active Defense and Threat Intelligence
Instructor: Robert M. Lee
Introduction to NetWars
Instructor: Tim Medin
NOC/SOC Integration: Opportunities for Increased Efficiency in Incident Response within Cyber-Security
Instructor: Nelson Hernandez
Product Management of Security Solutions: What's It Like and How to Do It?
Instructor: Lenny Zeltser
Responding to the European Union's new General Data Protection Regulation
Instructor: Ben Wright
Russian hackers, the DNC, and the missing server, oh my!
Instructor: Jake Williams
SANS CyberTalent Ice Cream Social
So, You Wanna be a Pentester?
Instructor: Adrien de Beaupre
State of the Internet Panel Discussion
Instructor: Dr. Johannes Ullrich, ISC Director, Marcus Sachs, and Internet Storm Center Handlers
System Security Engineering Approach in Evaluating Commercial and Open Source Software Products
Instructor: Jesus Abelarde
Threat Hunting via Windows Event Logs
Instructor: Eric Conrad
War Stories on Automated Threat Intelligence for Defense
Instructor: John Bambenek, ISC Handler
What does it take to be a l337 Cyber Analyst?
Instructor: Lorna Hutcheson- ISC Handler