Upload
hanguyet
View
215
Download
3
Embed Size (px)
Citation preview
T h e M o s T T r u s T e d N a M e f o r I N f o r M aT I o N a N d s o f T wa r e s e c u r I T y T r a I N I N g w o r l d w I d e
www.sans.org/secure-india-2017
S E C 5 0 4 Hacker Tools, Techniques, Exploits,
and Incident Handling20-25 Feb | GIAC Cert: GCIH | Steve Armstrong
By helping you understand attackers’ tactics and strategies in detail, giving you hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan, this course helps you turn the tables on computer attackers. It addresses the latest cutting-edge insidious attack vectors, the “oldie-but-goodie” attacks that are still prevalent, and everything in between.
S E C 5 0 3 Intrusion Detection
In-Depth27 Feb - 4 Mar | GIAC Cert: GCIA | Jonathan Ham
SEC503 delivers the technical knowledge, insight, and hands-on training you need to defend your network with confidence. Our goal is to acquaint you with the core knowledge, tools, and techniques to defend your networks. The training will prepare you to put your new skills and knowledge to work immediately upon returning to a live environment.
F O R 5 0 8 Advanced Threat Hunting and Incident Response
20-25 Feb | GIAC Cert: GCFA | Jake Williams
This in-depth incident response and threat hunting course provides responders and threat hunting teams with advanced skills to hunt down, identify, counter, and recover from a wide range of threats within enterprise networks, including APT nation-state adversaries, organized crime syndicates, and hactivism. Constantly updated, FOR508 addresses today’s incidents by providing hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to detect, counter, and respond to real-world breach cases.
F O R 5 7 8 Cyber Threat Intelligence
27 Feb - 3 Mar | Jake Williams
During a targeted attack, an organization needs a top-notch and cutting-edge incident response armed with the critical intelligence necessary to understand how adversaries operate and to combat the threat. FOR578 will train you and your team to detect, scope, and select resilient courses of action in response to such intrusions and data breaches.
For further information, contact:
[email protected] | +91-9741900324 (Arindam Roy)
[email protected] | +91 9717886943 (Andrew Johns)
Secure India 201720 Feb - 4 Mar | Venue: Le Meridien Bangalore
SA
NS
C
UR
RI
CU
LU
M
RO
AD
MA
PS
SE
CU
RI
TY
C
UR
RI
CU
LU
MBe
ginn
ers
SEC
301
NO
TE:
If
you
have
exp
erie
nce
in t
he fi
eld,
pl
ease
con
side
r ou
r m
ore
adva
nced
co
urse
– S
EC40
1.
SE
C3
01
Intr
o t
o
Info
rmat
ion S
ecuri
tyG
ISF
FO
RE
NS
IC
S
CU
RR
IC
UL
UM SP
EC
IAL
IZA
TIO
N
FO
R5
26
Mem
ory
Fo
rensi
cs
In-D
epth
MG
T5
35
Inci
den
t R
espo
nse
T
eam
Man
agem
ent
Dig
ital
Fo
rens
ic I
nves
tiga
tio
ns
FO
R5
85
Adva
nce
d S
mar
tpho
ne
Fo
rensi
csG
ASF
FO
R5
18
Mac
Fo
rensi
c
Anal
ysis
FO
R6
10
Rev
erse
Engi
nee
ring
Mal
war
e:
Mal
war
e A
nal
ysis
To
ols
and T
echniq
ues
GR
EM
FO
R4
08
Win
do
ws
Fo
rensi
c A
nal
ysis
GC
FE
SE
C5
04
Hac
ker
To
ols
, Tec
hniq
ues
, E
xplo
its,
and I
nci
den
t H
andlin
gG
CIH
FO
R5
26
Mem
ory
Fo
rensi
cs
In-D
epth
MA
LWA
RE
AN
ALY
SIS
Inci
dent
Res
pons
e an
d T
hrea
t H
unti
ng
NE
TW
OR
K A
NA
LYSI
S
SE
C5
03
Intr
usi
on D
etec
tio
n
In-D
epth
GC
IA
SE
C5
04
Hac
ker
To
ols
, Tec
hniq
ues
, E
xplo
its,
and I
nci
den
t H
andlin
gG
CIH
SE
C4
01
Sec
uri
ty E
ssen
tial
s B
oo
tcam
p S
tyle
GSE
C
FO
R6
10
Rev
erse
Engi
nee
ring
Mal
war
e: M
alw
are
Anal
ysis
T
oo
ls a
nd T
echniq
ues
GR
EM
FO
R5
78
Cyb
er T
hre
at I
nte
llige
nce
FO
R5
72
Adva
nce
d N
etw
ork
Fo
rensi
cs a
nd A
nal
ysis
GN
FA
EN
DP
OIN
T A
NA
LYSI
S
FO
R4
08
Win
do
ws
Fo
rensi
c A
nal
ysis
GC
FE
Net
wor
k O
pera
tion
s C
ente
r, S
yste
m A
dmin
, Se
curi
ty A
rchi
tect
ure
SE
C5
05
Secu
ring
Win
do
ws
and P
ow
erSh
ell
Aut
om
atio
nG
CW
N
SE
C5
01
Adva
nced
Sec
urit
y E
ssen
tial
s –
E
nter
pri
se D
efen
der
GC
ED
SE
C5
66
Imple
men
ting
and
A
udit
ing
the
Cri
tica
l Se
curi
ty C
ont
rols
GC
CC
SE
C5
06
Secu
ring
Lin
ux/U
nix
GC
UX
SE
C5
79
Vir
tual
izat
ion
and
Pri
vate
Clo
ud
Secu
rity
SE
C4
01
Secu
rity
Ess
enti
als
Bo
otc
amp S
tyle
GSE
C
Pen
etra
tion
Tes
ting
SE
C4
01
Secu
rity
Ess
enti
als
Bo
otc
amp S
tyle
GSE
C
SE
C7
60
Adva
nced
Exp
loit
D
evel
opm
ent
for
Pen
etra
tio
n T
este
rs
SE
C5
60
Net
wo
rk P
en
Tes
ting
and
E
thic
al H
acki
ngG
PEN
SE
C6
42
Adva
nced
W
eb A
pp P
en T
esti
ng
and E
thic
al H
acki
ng
SE
C5
42
Web
App P
en
Tes
ting
and
E
thic
al H
acki
ngG
WA
PT
SE
C6
17
Wir
eles
s E
thic
al
Hac
king
, Pen
Tes
ting
, an
d D
efen
ses
GA
WN
SE
C5
75
Mo
bile
Dev
ice
Se
curi
ty a
nd
Eth
ical
Hac
king
GM
OB
SE
C5
61
Imm
ersi
ve H
ands-
On
Hac
king
Tec
hniq
ues
SE
C5
73
Pyt
hon
for
Pen
etra
tio
n T
este
rsG
PY
C
SE
C5
67
Soci
al E
ngin
eeri
ng fo
r Pen
etra
tio
n T
este
rs
SE
C5
80
Met
asplo
it K
ung
Fu
for
Ent
erpri
se
Pen
Tes
ting
SE
C5
62
Cyb
erC
ity
H
ands-
on
Kin
etic
C
yber
Ran
ge
Exe
rcis
e
NE
TW
OR
K
& E
XP
LO
ITS
WE
BM
OB
ILE
/WIR
EL
ESS
LA
B-C
EN
TE
RE
DSP
EC
IALI
ZA
TIO
N
SE
C6
60
Adva
nced
Pen
etra
tio
n T
esti
ng,
Exp
loit
Wri
ting
, and
E
thic
al H
acki
ngG
XP
N
MA
NA
GE
ME
NT
C
UR
RI
CU
LU
M
MG
T5
25
IT P
roje
ct
Man
agem
ent,
Effe
ctiv
e C
omm
unic
atio
n &
P
MP
® E
xam
Pre
pG
CP
M
MG
T4
33
Secu
ring
The
H
uman
: H
ow
to
Bui
ld,
Mai
ntai
n an
d M
easu
re a
Hig
h-Im
pact
Aw
aren
ess
Pro
gram
DE
VE
LO
PE
R
CU
RR
IC
UL
UM
CO
RE
FO
UN
DA
TIO
NA
L
SP
EC
IAL
IZA
TIO
N
SE
CU
RE
CO
DIN
G
DE
V5
41
Secu
re C
odi
ng
in J
ava/
JEE
GSS
P-J
AVA
DE
V5
43
Secu
re
Co
ding
in
C/C
++
DE
V5
44
Secu
re C
odi
ng
in .N
ET
GSS
P-.
NET
MG
T5
12
SAN
S Se
curi
ty L
eade
rshi
p E
ssen
tial
s fo
r M
anag
ers
wit
h K
now
ledg
e C
om
pres
sio
n™G
SLC
SP
EC
IAL
IZA
TIO
N
SE
C5
42
Web
App
Pen
Tes
ting
and
E
thic
al H
acki
ngG
WA
PT
SE
C6
42
Adv
ance
d W
eb A
pp
Pen
Tes
ting
and
E
thic
al H
acki
ng
MG
T4
14
SAN
S T
rain
ing
Pro
gram
fo
r C
ISSP
®
Cer
tific
atio
nG
ISP
Securin
g T
he
Hum
an f
or
Develo
pers
App
licat
ion
Secu
rity
A
war
enes
s M
odu
les
DE
V5
22
Def
endi
ng W
eb
App
licat
ions
Se
curi
ty E
ssen
tial
sG
WEB
DE
V5
34
Secu
re D
evO
ps:
A P
ract
ical
In
tro
duct
ion
DE
V5
31
Def
endi
ng M
obi
le
App
licat
ions
Sec
urit
y E
ssen
tial
s
PMP
is re
gist
ered
mar
k of
the
Proj
ect M
anag
emen
t Ins
titut
e, In
c.
MG
T5
14
IT S
ecur
ity
Stra
tegi
c P
lann
ing,
Po
licy,
an
d Lea
ders
hip
CO
RE
MG
T5
35
Inci
dent
R
espo
nse
Tea
m
Man
agem
ent
LE
G5
23
Law
of D
ata
Secu
rity
an
d In
vest
igat
ions
GLE
G
SE
C5
66
Impl
emen
ting
and
A
udit
ing
th
e C
riti
cal S
ecur
ity
C
ont
rols
– I
n-D
epth
GC
CC
AU
D5
07
Aud
itin
g &
M
oni
tori
ng N
etw
ork
s,
Per
imet
ers,
an
d Sy
stem
sG
SNA
Indu
stri
al C
ontr
ol
Syst
ems IC
S4
56
Ess
enti
als
for
NE
RC
Cri
tica
l In
fras
truct
ure
P
rote
ctio
n
ICS
51
5IC
S A
ctiv
e D
efen
se a
nd
Inci
den
t R
espo
nse
ICS
41
0IC
S/SC
AD
A
Secu
rity
E
ssen
tial
sG
ICSP
Secu
rity
Ope
rati
ons
Cen
ter/
Intr
usio
n D
etec
tion
EN
DP
OIN
T
MO
NIT
OR
ING
NE
TW
OR
K M
ON
ITO
RIN
G
SE
C4
01
Secu
rity
Ess
enti
als
Bo
otc
amp S
tyle
GSE
C
FO
R5
08
Adva
nce
d D
igit
al F
ore
nsi
cs,
Inci
den
t R
espo
nse
, an
d T
hre
at H
unti
ng
GC
FA
SE
C5
01
Adva
nce
d S
ecuri
ty
Ess
enti
als
– E
nte
rpri
se D
efen
der
GC
ED
TH
RE
AT
IN
TE
LL
IGE
NC
E
FO
R5
78
Cyb
er T
hre
at
Inte
llige
nce
SE
C5
03
Intr
usi
on
Det
ecti
on
In-D
epth
GC
IA
FO
R5
72
Adva
nce
d
Net
wo
rk
Fore
nsi
cs
and A
nal
ysis
GN
FA
SE
C5
11
Co
nti
nuo
us
Mo
nit
ori
ng
and
Secu
rity
Oper
atio
ns
GM
ON
SE
C5
50
Act
ive
Def
ense
, O
ffen
sive
C
ounte
rmea
sure
s,
and C
yber
D
ecep
tio
n
SE
C5
04
Hac
ker
To
ols
, Tec
hniq
ues,
Exp
loit
s,
and I
ncid
ent
Han
dlin
gG
CIH
SE
C5
50
Act
ive
Def
ense
, Offen
sive
C
oun
term
easu
res,
and
C
yber
Dec
epti
on
SE
C5
04
Hac
ker
To
ols
, Tec
hniq
ues
, E
xplo
its,
and I
nci
den
t H
andlin
gG
CIH
For i
nfor
mat
ion
on a
ll of
SA
NS’
cour
ses,
visit
www.
sans
.org/
cour
ses
GIAC
cer
tifica
tion
avai
labl
e
for
cour
ses
indi
cate
d wi
th
GIAC
acr
onym
s
FO
R5
08
Adva
nce
d D
igit
al F
ore
nsi
cs,
Inci
den
t R
espo
nse
, an
d T
hre
at H
unti
ng
GC
FA
FO
R5
08
Adva
nce
d D
igit
al F
ore
nsi
cs,
Inci
den
t R
espo
nse
, an
d T
hre
at H
unti
ng
GC
FA