Save $400 on InfoSec Training at SANS New York City Summer 2018. Ends Tomorrow!


Washington, DC | Sat, Jul 14 - Sat, Jul 21, 2018
Event starts in 25 Days

Sa 14Su 15Mo 16Tu 17We 18Th 19Fr 20Sa 21
NewSEC455: SIEM Design & Implementation
Instructor: John Hubbard
NewSEC555: SIEM with Tactical Analytics  
NewSEC564: Red Team Operations and Threat Emulation
Instructor: Joe Vest
NewSEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses  
SEC401: Security Essentials Bootcamp Style
Instructor: Bryan Simon
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Instructor: John Strand
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
FOR500: Windows Forensic Analysis
Instructor: Chad Tilbury
SEC542: Web App Penetration Testing and Ethical Hacking  
SEC503: Intrusion Detection In-Depth
Instructor: David Hoelzer
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS Training Program for CISSP® Certification
Instructor: David R. Miller
FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting
Instructor: Rob Lee
WaitlistSEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: Tim Medin
SEC505: Securing Windows and PowerShell Automation
Instructor: Jason Fossen
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: Clay Risenhoover
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
WaitlistSEC617: Wireless Penetration Testing and Ethical Hacking
Instructor: James Leyte-Vidal
SEC575: Mobile Device Security and Ethical Hacking
Instructor: Joshua Wright
SEC301: Introduction to Cyber Security
Instructor: Keith Palmgren
WaitlistDEV522: Defending Web Applications Security Essentials
Instructor: Jason Lam
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
WaitlistDEV541: Secure Coding in Java/JEE: Developing Defensible Applications
Instructor: Gregory Leonard
SEC440: Critical Security Controls: Planning, Implementing, and Auditing
Instructor: Russell Eubanks
SEC506: Securing Linux/Unix
Instructor: Hal Pomeranz
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
MGT514: Security Strategic Planning, Policy, and Leadership
Instructor: Frank Kim
MGT433: SANS Security Awareness: How to Build, Maintain, and Measure a Mature Awareness Program
Instructor: Lance Spitzner
SEC580: Metasploit Kung Fu for Enterprise Pen Testing      
WaitlistSEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
Instructor: Adrien de Beaupre
SEC511: Continuous Monitoring and Security Operations
Instructor: Eric Conrad
WaitlistSEC530: Defensible Security Architecture
Instructor: Justin Henderson
Sold OutSEC545: Cloud Security Architecture and Operations
Instructor: Dave Shackleford
SEC567: Social Engineering for Penetration Testers
Instructor: Micah Hoffman
SEC573: Automating Information Security with Python
Instructor: Mark Baggett
WaitlistSEC760: Advanced Exploit Development for Penetration Testers
Instructor: Stephen Sims
FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
Instructor: Philip Hagen
WaitlistFOR578: Cyber Threat Intelligence
Instructor: Jake Williams
WaitlistFOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
MGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
WaitlistMGT517: Managing Security Operations: Detection, Response, and Intelligence   
DEV534: Secure DevOps: A Practical Introduction
Instructor: Gregory Leonard
ICS410: ICS/SCADA Security Essentials   
WaitlistICS515: ICS Active Defense and Incident Response
Instructor: Robert M. Lee
Core NetWars Experience      
Cyber Defense NetWars Tournament      
DFIR NetWars Tournament      
2FA Authentication in Mobile Applications: Challenges and Opportunities
Instructor: Bojan Zdrnja, ISC Handler
Blockchain: the New Digital Swiss Army Knife?
Instructor: G. Mark Hardy
Coffee & Donuts with the Graduate Students
Commitment Issues: Can You Really Trust What Your Tools Are Telling You?
Instructor: Heather Mahalik, Domenica Crognale
Defense Is Doable - Breaking The Cyber Kill Chain
Instructor: Erik Van Buggenhout & Stephen Sims
Detecting Penetration Testers on a Windows Network with Splunk
Instructor: Fred Speece
Dynamic Analysis and Reconstructing an Infection Chain
Instructor: Brad Duncan, ISC Handler
Exploring a P2P Transient Botnet - From Discovery to Enumeration
Instructor: Renato Marinho, ISC Handler
Full Packet Capture for the Masses
Instructor: Xavier Mertens, ISC Handler
General Session - Welcome to SANS
Instructor: Dr. Johannes Ullrich, ISC Director
GIAC Overview Presentation
Instructor: Jeff Frisk
Hacking Dumberly, Just Like the Bad Guys
Instructor: Tim Medin
How to Create/Share Indicators and SOC Metrics Efficiently
Instructor: Tom Webb, ISC Handler
Industrial Control System Active Defense and Threat Intelligence
Instructor: Robert M. Lee
Introduction to NetWars
Instructor: Tim Medin
NOC/SOC Integration: Opportunities for Increased Efficiency in Incident Response within Cyber-Security
Instructor: Nelson Hernandez
Product Management of Security Solutions: What's It Like and How to Do It?
Instructor: Lenny Zeltser
Responding to the European Union's new General Data Protection Regulation
Instructor: Ben Wright
SANS CyberTalent Ice Cream Social
So, You Wanna be a Pentester?
Instructor: Adrien de Beaupre
State of the Internet Panel Discussion
Instructor: Dr. Johannes Ullrich, ISC Director, Marcus Sachs, and Internet Storm Center Handlers
System Security Engineering Approach in Evaluating Commercial and Open Source Software Products
Instructor: Jesus Abelarde
Threat Hunting via Windows Event Logs
Instructor: Eric Conrad
War Stories on Automated Threat Intelligence for Defense
Instructor: John Bambenek, ISC Handler
What does it take to be a l337 Cyber Analyst?
Instructor: Lorna Hutcheson- ISC Handler