We are pleased invite you to SANS Secure Singapore 2013 on 25 February - 2 March at the Grand Copthorne Waterfront Hotel. We have six courses planned that cover a broad spectrum of SANS' hands-on Information Security and Forensics Courses. On the schedule to instruct these courses are: Dr. Eric Cole (SEC501), Bryce Galbraith (SEC504), Raul Siles (SEC 575), Stephen Sims (SEC660), Chad Tilbury (FOR408), and Jess Garcia (FOR610). Don't miss the opportunity to take one of the courses below from SANS' top instructors!
Classes at our recent events have sold out, so you may wish to register early to avoid disappointment.
Below is a brief description of each of the courses - please feel welcome contact us at AsiaPacific@sans.org for further information on this exciting lineup.
Security 501: Advanced Security Essentials - Enterprise Defender
Cyber security continues to be a critical area for organizations and will continue to increase in importance as attacks become stealthier, have a greater financial impact on an organization, and cause reputational damage. While Security Essentials lays a solid foundation for the security practitioner, there is only so much that can be packed into a six-day course. Despite an organization's best effort at preventing attacks and protecting their critical data, some attacks will still be successful. Therefore we need to be able to detect attacks in a timely fashion. This is accomplished by understanding the traffic that is flowing on your networks and looking for indication of an attack. It also includes performing penetration testing and vulnerability analysis against an organization to identify problems and issues before a compromise occurs.
Finally, once an attack is detected we must react to it in a timely fashion and perform forensics. By understanding how the attacker broke in, this can be fed back into more effective and robust preventive and detective measures, completing the security lifecycle.
Security 504: Hacker Techniques, Exploits and Incident Handling
Learn to detect malicious code and respond on the fly. You'll learn how your networks appear to hackers, how they gain access with special emphasis on the newer attack vectors, and what they do when they get in - especially in manipulating the system to hide their work. Master the proven six-step process of incident handling so you are prepared to prepared to be the technical leader of an incident handling team.
Security 575: Mobile Device Security and Ethical Hacking
This hands-on course provides the core knowledge and skills that a digital forensic investigator needs to process cellphone, PDA's and other mobile devices. Using state of the art tools, you will learn how to forensically preserve, acquire and examine data stored on mobile devices and utilize the results for internal investigations or in civil/criminal litigation.
Security 660: Advanced Penetration Testing, Exploits, and Ethical Hacking
This advanced course is a logical progression point for those who have completed SEC 560: Network Penetration Testing and Ethical Hacking or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a real world lab environment to solidify advanced concepts and allow for the immediate application of techniques in the workplace.
Forensics 408: Computer Forensic Investigations - Windows In-Depth
This course focuses on the essentials that a forensic investigator must know to investigate core computer crime incidents successfully. You will learn how computer forensic analysts focus on collecting and analyzing data from computer systems to track user-based activity that could be used internally or in civil/criminal litigation.
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
The malware analysis process taught in this class helps incident responders assess the severity and repercussions of a situation that involves malicious software. It also assists in determining how to contain the incident and plan recovery steps. Forensics investigators also learn how to understand key characteristics of malware present on compromised systems, including how to establish indicators of compromise (IOCs) for scoping and containing the intrusion.
Please see click on any course name on our Event Home Page to see our complete course descriptions.
Write to us at AsiaPacific@sans.org for more information. We look forward to reconnecting with you at SANS Secure Singapore 2013!
MD Asia Pacific