LONDON SUMMER 2016 SAT 9 SAT 16 JULY, 2016 #SANSLONDON. 14 SANS COURSES SEC566 Implementing and Auditing the Critical Security Controls- In Depth

Similar documents
SANS OFFERS HANDS -ON, IMMERSION-STYLE INFORMATION SECURITY TRAINING

Certified Cyber Security Specialist

CALENDAR FOR THE YEAR 2018

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

TRAINING CATALOGUE 2017/ 18

IoT & SCADA Cyber Security Services

CYBER RESILIENCE & INCIDENT RESPONSE

Hacker Academy UK. Black Suits, White Hats!

DEEPER KNOWLEDGE. ADVANCED SECURITY.

to Enhance Your Cyber Security Needs

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

The fast track to top skills and top jobs in cyber. Guaranteed.

CYBER SECURITY TRAINING

MON 29 FEB - SAT 5 MAR, 2016 SANS LONDON SPRING. #SANSLondon

Training Catalogue THE LARGEST AND MOST TRUSTED SOURCE OF CYBER SECURITY EMEA PRIVATE TRAINING TRAINING EVENTS

BLACK HAT USA 2013 ADD A CLASS REQUEST FORM INSTRUCTIONS

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit

Security Awareness Training Courses

Defense in Depth. Constructing Your Walls for Your Enterprise. Mike D Arezzo Director of Security April 21, 2016

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

Cyber Security Technologies

SRM Service Guide. Smart Security. Smart Compliance. Service Guide

Course 831 Certified Ethical Hacker v9

Cyber Security Congress 2017

Cyber Security School

Certified Ethical Hacker

Cyber Analyst Academy. Closing the Cyber Security Skills Gap.

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Networking Fundamentals Training

SOLUTION BRIEF Virtual CISO

Security Stream for Computer Science

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

External Supplier Control Obligations. Cyber Security

CIRCULAR. CIR/MRD/CSC/148/2018 December 07, 2018

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Training on CREST Practitioner Security Analyst (CPSA)

SANS GULF REGION DUBAI: NOVEMBER 5 17, 2016 #SANSGULFREGION 6 SANS COURSES. SEC511 Continuous Monitoring and Security Operations

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Cyber Resilience. Think18. Felicity March IBM Corporation

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

Instructor: Eric Rettke Phone: (every few days)

An Introduction To Security Planning

BCS Level 4 Certificate in Cyber Security Introduction Syllabus QAN 603/0830/8

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

Digital Health Cyber Security Centre

Department of Management Services REQUEST FOR INFORMATION

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Certificate in Security Management

Defense in Depth Security in the Enterprise

RSA INCIDENT RESPONSE SERVICES

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Certified Ethical Hacker V9

RSA INCIDENT RESPONSE SERVICES

A United States Cyber Academy Program

Enhance Your Cyber Risk Awareness and Readiness. Singtel Business

Cybersecurity Auditing in an Unsecure World

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Standard Course Outline IS 656 Information Systems Security and Assurance

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

locuz.com SOC Services

SPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES

Continuous protection to reduce risk and maintain production availability

TRUE SECURITY-AS-A-SERVICE

Certified Cyber Security Analyst VS-1160

SANS MUNICH #SANSMunich

DIS10.3:CYBER FORENSICS AND INVESTIGATION

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CYBERSECURITY MATURITY ASSESSMENT

Cybersecurity Today Avoid Becoming a News Headline

A Comparative Study of Teaching Forensics at a University Degree Level

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

The GenCyber Program. By Chris Ralph

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

RiskSense Attack Surface Validation for IoT Systems

COMPUTER TECHNOLOGY (COMT)

CyberEdge. End-to-End Cyber Risk Management Solutions

Attackers Process. Compromise the Root of the Domain Network: Active Directory

Getting Security Operations Right with TTP0

Transcription:

THE WORLD S LARGEST & MOST TRUSTED PROVIDER OF CYBER URITY TRAINING LONDON SUMMER 201 SAT 9 SAT 1 JULY, 201 #SANSLONDON 401 Security Essentials Bootcamp Style 03 Intrusion Detection In-Depth 0 Securing Linux/Unix 14 SANS COURSES Implementing and Auditing the Critical Security Controls- In Depth 0 Advanced Penetration Testing, Exploit Writing, and Ethical Hacking 72 Advanced Network Forensics and Analysis 24 Cloud Security Fundamentals 02 Perimeter Protection In-Depth 04 Hacker Tools, Techniques, Exploits and Incident Handling 0 Active Defense, Offensive Countermeasures and Cyber Deception 17 Wireless Ethical Hacking, Penetration Testing, and Defenses 08 Advanced Digital Forensics and Incident Response 78 Cyber Threat Intelligence 7 Social Engineering for Penetration Testers Register online and see full course descriptions at www.sans.org/london-in-the-summer-201 Save 20 with discount code EarlyBird1 for any course by 1 June, 201.

ABOUT SANS SANS is the world s largest provider of cyber security training. We now train over 40,000 cyber security professionals around the world each year. We operate across 30 geographic regions. In those regions SANS trains cyber security operatives and managers who work in government departments, for military bodies and for large commercial organisations. COURSES AT A GLANCE 401 02 03 04 0 0 17 0 08 72 78 24 7 Security Essentials Bootcamp Style Dr. Eric Cole & Stephen Sims Perimeter Protection In-Depth Paul A. Henry Intrusion Detection In-Depth David Hoelzer Hacker Tools, Techniques, Exploits and Incident Handling Dave Shackleford Securing Linux/Unix Hal Pomeranz Active Defense, Offensive Countermeasures and Cyber Deception Bryce Galbraith Implementing and Auditing the Critical Security Controls In Depth Chris Christianson Wireless Ethical Hacking, Penetration Testing, and Defences Larry Pesce Advanced Penetration Testing, Exploit Writing, and Ethical Hacking James Lyne Advanced Digital Forensics and Incident Response Jess Garcia Advanced Network Forensics and Analysis Philip Hagen Cyber Threat Intelligence Robert M. Lee Cloud Security Fundamentals Dave Shackleford Social Engineering for Penetration Testers James Lyne SAT 9 SUN 10 MON 11 TUE 12 WED 13 THU 14 FRI 1 SAT 1 CONTACT SANS www.sans.org/emea Email: emea@sans.org Tel: +44 20 3384 3470 @SANSEMEA REGISTER NOW www.sans.org/london-in-the-summer-201

WELCOME TO SANS LONDON SUMMER 201 SANS LONDON SUMMER RUNS FROM THE 9TH JULY 1TH JULY AT THE GRAND CONNAUGHT ROOMS AND HOSTS 14 COURSES DRAWN FROM ACROSS THE SANS CURRICULUM. Registration fees include all courseware and training materials plus morning and afternoon break refreshments and lunch served in the hotel restaurant. Accommodation is not included. Students are able to attend free evening functions. The demand for places at London events is always high so please register online as soon as possible to secure a seat at SANS London Summer 201. Read on for course descriptions or visit www.sans.org/london-in-the-summer-201 LOCATION Grand Connaught Rooms 1- Great Queen Street London, WC2B DA REGISTER NOW www.sans.org/london-in-the-summer-201 #SANSLondon 9 1 Jul, 201 3

COURSE SUMMARIES 401 WWW.SANS.ORG/401 URITY ESSENTIALS BOOTCAMP STYLE DR. ERIC COLE & STEPHEN SIMS 401 teaches students the essential skills and techniques needed to protect and secure an organisation s critical information assets and business systems. Students learn the language and underlying theory of computer and information security and gain the knowledge needed to secure systems and organisations. 02 WWW.SANS.ORG/02 PERIMETER PROTECTION IN-DEPTH PAUL A. HENRY This course provides a comprehensive analysis of a wide breadth of protection technologies. A proper security posture must be comprised of multiple layers. This course was developed to teach the knowledge and tools necessary at every layer to ensure a network is secure. 03 WWW.SANS.ORG/03 INTRUSION DETECTION IN-DEPTH DAVID HOELZER In-depth penetration testing skills learned in this course will prepare you to conduct professional-grade pen tests, end-to-end, including scoping, recon, scanning, exploitation, post-exploitation and more. 04 WWW.SANS.ORG/04 HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING DAVE SHACKLED 04 provides hands-on experience in finding vulnerabilities and discovering intrusions, whilst also equipping students with a comprehensive incident-handling plan. The course addresses the latest cutting-edge, insidious attack vectors as well as less recent attacks that are still prevalent. 4 #SANSLondon 9 1 Jul, 201 REGISTER NOW www.sans.org/london-in-the-summer-201

COURSE SUMMARIES WWW.SANS.ORG/0 URING LINUX/UNIX HAL POMERANZ 0 Experience in-depth coverage of Linux and Unix security issues and examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems. Specific configuration guidance and practical, real-world examples, tips, and tricks are provided to help students remove vulnerabilities. WWW.SANS.ORG/0 ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION BRYCE GALBRAITH 0 This course is based on the Active Defense Harbinger Distribution live Linux environment funded by the Defense Advanced Research Projects Agency. This virtual machine is built from the ground up for defenders to quickly implement Active Defences in their environments. WWW.SANS.ORG/ IMPLEMENTING AND AUDITING THE CRITICAL URITY CONTROLS - IN DEPTH CHRIS CHRISTIANSON SANS designed this course to train students how to implement the Twenty Critical Security Controls a prioritised, risk-based approach to security that was designed by a master group of private and public sector experts from around the world. WWW.SANS.ORG/17 WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES LARRY PESCE 17 This course is dedicated to the art of analysing wireless protocols, devices and infrastructures to find vulnerabilities and fix them, with topics ranging from wireless LANs to Bluetooth to ZigBee and more. REGISTER NOW www.sans.org/london-in-the-summer-201 #SANSLondon 9 1 Jul, 201

COURSE SUMMARIES 0 WWW.SANS.ORG/0 ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING JAMES LYNE This course is designed to take your skills to a whole new level, with indepth information and techniques about targeting network infrastructures, fuzzing to find vulnerabilities, exploiting crypto problems, writing and customising exploits for Windows and Linux, and more. 08 WWW.SANS.ORG/08 ADVANCED DIGITAL ENSICS AND INCIDENT RESPONSE JESS GARCIA This in-depth incident response course provides responders with advanced skills to hunt down, counter, and recover from a wide range of threats within enterprise networks, including APT adversaries, organised crime syndicates, and hactivism. Constantly updated, the course provides hands-on incident response tactics and techniques that elite responders are successfully using in real-world breach cases today. 72 WWW.SANS.ORG/72 ADVANCED NETWORK ENSICS AND ANALYSIS PHILIP HAGEN 72 was built from the ground up to cover the most critical skills needed to mount efficient and effective post-incident response investigations. It covers the tools, technology and processes required to integrate network evidence sources into investigations, with a focus on efficiency and effectiveness. 78 WWW.SANS.ORG/78 CYBER THREAT INTELLIGENCE ROBERT M. LEE When considering the value of threat intelligence, most individuals and organisations ask themselves three questions: What is threat intelligence? When am I ready for it? How do I use it? This class answers these questions and more at a critical point in the development of the field of threat intelligence in the wider community. #SANSLondon 9 1 Jul, 201 REGISTER NOW www.sans.org/london-in-the-summer-201

COURSE SUMMARIES WWW.SANS.ORG/24 CLOUD URITY FUNDAMENTALS DAVE SHACKLED 24 This course is based on the Active Defense Harbinger Distribution live Linux environment funded by the Defense Advanced Research Projects Agency. This virtual machine is built from the ground up for defenders to quickly implement Active Defences in their environments. WWW.SANS.ORG/7 SOCIAL ENGINEERING PENETRATION TESTERS JAMES LYNE 7 7 provides the blend of knowledge required to add social engineering skills to your penetration testing portfolio. Successful social engineering utilises psychological principles and technical techniques to measure your success and manage the risk. MGT433 AT LONDON SUMMER MGT433: URING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAMME TAKES PLACE ON 7 8 JULY 201, AT THE GRAND CONNAUGHT ROOMS IN CENTRAL LONDON. MGT433 is led by Lance Spitzner - SANS Securing The Human s Research and Community Director. MGT433 teaches students about The Security Awareness Maturity Model and how to use it as the roadmap for an awareness programme. THE COURSE ALSO TEACHES HOW TO: Effectively engage and communicate within an organisation. Identify and mitigate the top human risks to an organisation. Sustain a security awareness programme, including updating content and communication methods. Change an organisation s culture. Measure the impact of an awareness programme, track reduction in human risk, and communicate the campaign s value to management.

V17 - A Most courses are also available online, via SANS OnDemand. Contact emea@sans.org for information. Dates, Locations and Courses offered subject to change FRANKFURT, 201 DEC 12 TH - 17 TH AMSTERDAM, 201 DEC 12 TH - 17 TH LONDON, 201 NOV 14 TH - 19 TH EUROPEAN URITY AWARENESS SUMMIT NOV 9 TH - 11 TH GULF REGION, 201 NOV TH - 17 TH DFIR PRAGUE, 201 OCT 3 RD - 1 TH OSLO, 201 OCT 3 RD - 8 TH LONDON AUTUMN, 201 SEP 19 TH - 24 TH ICS LONDON, 201 SEP 19 TH - 2 TH BRUSSELS AUTUMN, 201 SEP TH - 10 TH LONDON SUMMER, 201 JUL 9 TH - 1 TH PEN TEST BERLIN, 201 JUN 20 TH - 2 TH STOCKHOLM, 201 MAY 9 TH - 14 TH PRAGUE, 201 MAY 9 TH - 14 TH COPENHAGEN, 201 APR 2 TH - 30 TH ICS AMSTERDAM, 201 APR 18 TH - 22 ND URE EUROPE, 201 APR 4 TH - 1 TH LOCATION DATE AUD07 DEV22 DEV41 MGT433 MGT12 MGT14 408 08 18 2 72 78 8 10 ICS410 ICS1 401 01 02 03 04 0 0 11 24 42 0 0 2 7 73 7 79 17 42 0 70 4 2 2 2 IT AUDIT DEVELOPER MANAGE ENSICS ICS/SCADA URITY EMEA SANS EMEA TRAINING EVENTS For a full list of training events, please visit www.sans.org 201