Events Search and Views Navigation
Past Events › Training
Events List Navigation
One of my greatest joys in life is helping people understand the complex landscape of security so that they can implement really effective defenses. It may be difficult to fully grasp what truly impacts the security of your organization versus what is simply product marketing hype. This class is the nexus between attacks and defenses, chock full of vital information for thwarting today's nastiest attacks. Ed Skoudis and I continuously refine this class on the foundation of the multitude of…
Find out more »Certified Counter Terrorism Practitioner (CCTP).
Find out more »Welcome to SEC599- Defeating Advanced Adversaries - Implementing Kill Chain Defenses
Find out more »One of the best features of the course is that it uses offense to inform defense. In other words, you will learn about the actual attacks that you'll be stopping or mitigating. That makes the defenses very real, and it makes you a better security professional.
Find out more »Join Bhanu Goud, Security Systems Manager at the British Library for behind-the-scenes insight on security at the central London site and visitor attraction. You can earn three formal CPD points for attending.
Find out more »When SANS designed the Security Leadership for Managers course, we chose to emulate the format utilized by many executive MBA programs. While core source material is derived from our highly regarded SANS Security Essentials program, we decided to focus this program on the big picture of securing the enterprise: network fundamentals, security technologies, using cryptography, defense-in-depth, policy development, and management practicum. This course includes executive briefings designed to present a distilled summary of vitally important information security topics like operating…
Find out more »SANS MGT414: SANS Training Program for CISSP? Certification is an accelerated review course that is specifically designed to prepare students to successfully pass the CISSP? exam. MGT414 focuses solely on the 8 domains of knowledge as determined by (ISC)2 that form a critical part of CISSP? exam. Each domain of knowledge is dissected into its critical components, and those components are then discussed in terms of their relationship with one another and with other areas of information security.
Find out more »If you want to be good at something, whether it be sports, music, science, math, or information security, you MUST have a solid grasp of the fundamentals. In fact, the better you understand the fundamentals the better you will be at a particular skillset. Without that foundation to build on, it is almost impossible to become a master at something. The Introduction to Information Security course is all about building those fundamentals and creating that foundation.
Find out more »Day 2 starts with a discussion about the challenges of identity and access management in cloud environments. As more and more businesses are using the cloud to store data, we will discuss how to protect your critical data in the cloud. New approaches for data encryption, network encryption, key management, and data lifecycle concerns will be covered in detail. This will be followed by a discussion on intrusion detection and incident response in cloud environments, along with how to best…
Find out more »One of the best features of the course is that it uses offense to inform defense. In other words, you will learn about the actual attacks that you'll be stopping or mitigating. That makes the defenses very real, and it makes you a better security professional.
Find out more »Evening event for C-level execs. On Cyber Hygiene - Importance of Continuous Improvement in Cyber Fundamentals. Perspectives from chief information security officer
Find out more »What's new in the ICRealtime product lineup. Learn about our new product releases and software updates. Topics include IP Cameras, Video Management Systems, and Video Recorder platforms.
Find out more »With the combination of IoT devices, machines containing firmware and software based on outdated code, and employees connecting devices and data to the network, how a company manages its security is becoming a bigger part of doing business. As a result, an IoT manufacturer?s security needs to stand out from the competition in order to differentiate them from the rest. This presentation will review the complexities of securing the IoT, as well as protection from threats that emanate from compromised…
Find out more »