MD

Gartner Security & Risk Management Summit 2024

Cybersecurity is constantly evolving, but with it comes more complexity, which possibly gives malicious actors the advantage. At Gartner Security & Risk Management Summit, you will hear from top Gartner experts on the best way to evolve your security strategy by reframing and simplifying your defenses to be ready for current and future attacks. The […]

Gartner Security & Risk Management Summit 2023

Leading analyst firm Gartner hosts this annual event aims at security and risk leaders. The most recent event in 2022 focused on key strategic necessities including: Moving to an agile security program Simplifying cybersecurity mesh architecture Developing security-conscious work cultures that are human focused Mitigating risk ownership

The Campus Safety Conferences 2020

The Campus Safety Conferences are 2 1/2 day, intensive conferences that bring together security, public safety, emergency management, administration, facilities, business, and IT professionals responsible for protecting K-12 and Higher Education campuses and districts. Our mission is to create a community for all stakeholders to receive time-critical education and training while building peer-to-peer relationships that […]

APAC Evaluator training

The American Association of Laboratory Accreditation (A2LA) will kindly host a 3-day training course for APAC Evaluators from 4-6 February 2020 in Frederick, Maryland, United States of America.

SANS Baltimore Fall 2018

Join us for SANS Baltimore Fall 2018 (September 10-15), and learn vital skills to protect your organization from the latest cyber-attacks. SANS helps you stay ahead of the curve by providing unique, hands-on immersion training you can implement the day you return to work.

Community SANS Columbia SEC560

SEC560 is designed to get you ready to conduct a full-scale, high-value penetration test – and on the last day of the course you’ll do just that. After building your skills in comprehensive and challenging labs over five days, the course culminates with a final full-day, real-world penetration test scenario. You’ll conduct an end-to-end pen […]

Cyber Threat Intelligence Summit & Training 2018

Two days of in-depth threat intelligence talks and interactive discussions. Six hands-on, immersion-style courses following the Summit. Community-building events and networking opportunities

Community SANS Annapolis Junction MGT414

SANS MGT414: SANS Training Program for CISSP® Certification is an accelerated review course that is specifically designed to prepare students to successfully pass the CISSP® exam. MGT414 focuses solely on the 8 domains of knowledge as determined by (ISC)2 that form a critical part of CISSP® exam. Each domain of knowledge is dissected into its […]

Advanced Security Essentials – Enterprise Defender

Effective cybersecurity is more important than ever as attacks become stealthier, have a greater financial impact, and cause broad reputational damage. SEC501: Advanced Security Essentials – Enterprise Defender builds on a solid foundation of core policies and practices to enable security teams to defend their enterprise.

Security Essentials Bootcamp Style

Learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that you can directly apply when you get back to work. Learn tips and tricks from the experts so that you can win the battle against the wide range of cyber adversaries that want to harm your environment.

Advanced Digital Forensics, Incident Response, and Threat Hunting

The key is to constantly look for attacks that get past security systems, and to catch intrusions in progress, rather than after attackers have completed their objectives and done worse damage to the organization. For the incident responder, this process is known as “threat hunting”. Threat hunting uses known adversary behaviors to proactively examine the […]

Windows Forensic Analysis

FOR408: Windows Forensic Analysis focuses on building in-depth digital forensics knowledge of the Microsoft Windows operating systems. You can’t protect what you don’t know about, and understanding forensic capabilities and artifacts is a core component of information security. Learn to recover, analyze, and authenticate forensic data on Windows systems. Understand how to track detailed user […]

Advanced Digital Forensics, Incident Response, and Threat Hunting

The key is to constantly look for attacks that get past security systems, and to catch intrusions in progress, rather than after attackers have completed their objectives and done worse damage to the organization. For the incident responder, this process is known as “threat hunting”. Threat hunting uses known adversary behaviors to proactively examine the […]

Network Penetration Testing and Ethical Hacking

As a cybersecurity professional, you have a unique responsibility to find and understand your organization’s vulnerabilities and to work diligently to mitigate them before the bad guys pounce. Are you ready? SEC560, the flagship SANS course for penetration testing, fully arms you to address this duty head-on.

Hacker Tools, Techniques, Exploits and Incident Handling

This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills to examine malicious programs that target and infect Windows systems. Understanding the capabilities of malware is critical to an organization’s ability to derive threat intelligence, respond to […]

Community SANS

The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn’t!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly […]

Automating Information Security with Python

All security professionals, including Penetration Testers, Forensics Analysts, Network Defenders, Security Administrators, and Incident Responders, have one thing in common. CHANGE. Change is constant. Technology, threats, and tools are constantly evolving. If we don’t evolve with them, we’ll become ineffective and irrelevant, unable to provide the vital defenses our organizations increasingly require.