2
T HE M OST T RUSTED N AME FOR I NFORMATION AND S OFTWARE S ECURITY T RAINING W ORLDWIDE www.sans.org/secure-india-2017 SEC504 Hacker Tools, Techniques, Exploits, and Incident Handling 20-25 Feb | GIAC Cert: GCIH | Steve Armstrong By helping you understand attackers’ tactics and strategies in detail, giving you hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan, this course helps you turn the tables on computer attackers. It addresses the latest cutting-edge insidious attack vectors, the “oldie-but-goodie” attacks that are still prevalent, and everything in between. SEC503 Intrusion Detection In-Depth 27 Feb - 4 Mar | GIAC Cert: GCIA | Jonathan Ham SEC503 delivers the technical knowledge, insight, and hands-on training you need to defend your network with confidence. Our goal is to acquaint you with the core knowledge, tools, and techniques to defend your networks. The training will prepare you to put your new skills and knowledge to work immediately upon returning to a live environment. FOR508 Advanced Threat Hunting and Incident Response 20-25 Feb | GIAC Cert: GCFA | Jake Williams This in-depth incident response and threat hunting course provides responders and threat hunting teams with advanced skills to hunt down, identify, counter, and recover from a wide range of threats within enterprise networks, including APT nation-state adversaries, organized crime syndicates, and hactivism. Constantly updated, FOR508 addresses today’s incidents by providing hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to detect, counter, and respond to real-world breach cases. FOR578 Cyber Threat Intelligence 27 Feb - 3 Mar | Jake Williams During a targeted attack, an organization needs a top-notch and cutting-edge incident response armed with the critical intelligence necessary to understand how adversaries operate and to combat the threat. FOR578 will train you and your team to detect, scope, and select resilient courses of action in response to such intrusions and data breaches. For further information, contact: [email protected] | +91-9741900324 (Arindam Roy) [email protected] | +91 9717886943 (Andrew Johns) Secure India 2017 20 Feb - 4 Mar | Venue: Le Meridien Bangalore

Flyer2 Secure India 2017 A4 - SANS Information Security ... India 2017 20 Feb - 4 Mar | Venue: Le Meridien Bangalore SANS CURRICULUM ROADMAPS SECURITY CURRICULUM Beginners SEC301 NOTE:

Embed Size (px)

Citation preview

Page 1: Flyer2 Secure India 2017 A4 - SANS Information Security ... India 2017 20 Feb - 4 Mar | Venue: Le Meridien Bangalore SANS CURRICULUM ROADMAPS SECURITY CURRICULUM Beginners SEC301 NOTE:

T h e M o s T T r u s T e d N a M e f o r I N f o r M aT I o N a N d s o f T wa r e s e c u r I T y T r a I N I N g w o r l d w I d e

www.sans.org/secure-india-2017

S E C 5 0 4 Hacker Tools, Techniques, Exploits,

and Incident Handling20-25 Feb | GIAC Cert: GCIH | Steve Armstrong

By helping you understand attackers’ tactics and strategies in detail, giving you hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan, this course helps you turn the tables on computer attackers. It addresses the latest cutting-edge insidious attack vectors, the “oldie-but-goodie” attacks that are still prevalent, and everything in between.

S E C 5 0 3 Intrusion Detection

In-Depth27 Feb - 4 Mar | GIAC Cert: GCIA | Jonathan Ham

SEC503 delivers the technical knowledge, insight, and hands-on training you need to defend your network with confidence. Our goal is to acquaint you with the core knowledge, tools, and techniques to defend your networks. The training will prepare you to put your new skills and knowledge to work immediately upon returning to a live environment.

F O R 5 0 8 Advanced Threat Hunting and Incident Response

20-25 Feb | GIAC Cert: GCFA | Jake Williams

This in-depth incident response and threat hunting course provides responders and threat hunting teams with advanced skills to hunt down, identify, counter, and recover from a wide range of threats within enterprise networks, including APT nation-state adversaries, organized crime syndicates, and hactivism. Constantly updated, FOR508 addresses today’s incidents by providing hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to detect, counter, and respond to real-world breach cases.

F O R 5 7 8 Cyber Threat Intelligence

27 Feb - 3 Mar | Jake Williams

During a targeted attack, an organization needs a top-notch and cutting-edge incident response armed with the critical intelligence necessary to understand how adversaries operate and to combat the threat. FOR578 will train you and your team to detect, scope, and select resilient courses of action in response to such intrusions and data breaches.

For further information, contact:

[email protected] | +91-9741900324 (Arindam Roy)

[email protected] | +91 9717886943 (Andrew Johns)

Secure India 201720 Feb - 4 Mar | Venue: Le Meridien Bangalore

Page 2: Flyer2 Secure India 2017 A4 - SANS Information Security ... India 2017 20 Feb - 4 Mar | Venue: Le Meridien Bangalore SANS CURRICULUM ROADMAPS SECURITY CURRICULUM Beginners SEC301 NOTE:

SA

NS

C

UR

RI

CU

LU

M

RO

AD

MA

PS

SE

CU

RI

TY

C

UR

RI

CU

LU

MBe

ginn

ers

SEC

301

NO

TE:

If

you

have

exp

erie

nce

in t

he fi

eld,

pl

ease

con

side

r ou

r m

ore

adva

nced

co

urse

– S

EC40

1.

SE

C3

01

Intr

o t

o

Info

rmat

ion S

ecuri

tyG

ISF

FO

RE

NS

IC

S

CU

RR

IC

UL

UM SP

EC

IAL

IZA

TIO

N

FO

R5

26

Mem

ory

Fo

rensi

cs

In-D

epth

MG

T5

35

Inci

den

t R

espo

nse

T

eam

Man

agem

ent

Dig

ital

Fo

rens

ic I

nves

tiga

tio

ns

FO

R5

85

Adva

nce

d S

mar

tpho

ne

Fo

rensi

csG

ASF

FO

R5

18

Mac

Fo

rensi

c

Anal

ysis

FO

R6

10

Rev

erse

Engi

nee

ring

Mal

war

e:

Mal

war

e A

nal

ysis

To

ols

and T

echniq

ues

GR

EM

FO

R4

08

Win

do

ws

Fo

rensi

c A

nal

ysis

GC

FE

SE

C5

04

Hac

ker

To

ols

, Tec

hniq

ues

, E

xplo

its,

and I

nci

den

t H

andlin

gG

CIH

FO

R5

26

Mem

ory

Fo

rensi

cs

In-D

epth

MA

LWA

RE

AN

ALY

SIS

Inci

dent

Res

pons

e an

d T

hrea

t H

unti

ng

NE

TW

OR

K A

NA

LYSI

S

SE

C5

03

Intr

usi

on D

etec

tio

n

In-D

epth

GC

IA

SE

C5

04

Hac

ker

To

ols

, Tec

hniq

ues

, E

xplo

its,

and I

nci

den

t H

andlin

gG

CIH

SE

C4

01

Sec

uri

ty E

ssen

tial

s B

oo

tcam

p S

tyle

GSE

C

FO

R6

10

Rev

erse

Engi

nee

ring

Mal

war

e: M

alw

are

Anal

ysis

T

oo

ls a

nd T

echniq

ues

GR

EM

FO

R5

78

Cyb

er T

hre

at I

nte

llige

nce

FO

R5

72

Adva

nce

d N

etw

ork

Fo

rensi

cs a

nd A

nal

ysis

GN

FA

EN

DP

OIN

T A

NA

LYSI

S

FO

R4

08

Win

do

ws

Fo

rensi

c A

nal

ysis

GC

FE

Net

wor

k O

pera

tion

s C

ente

r, S

yste

m A

dmin

, Se

curi

ty A

rchi

tect

ure

SE

C5

05

Secu

ring

Win

do

ws

and P

ow

erSh

ell

Aut

om

atio

nG

CW

N

SE

C5

01

Adva

nced

Sec

urit

y E

ssen

tial

s –

E

nter

pri

se D

efen

der

GC

ED

SE

C5

66

Imple

men

ting

and

A

udit

ing

the

Cri

tica

l Se

curi

ty C

ont

rols

GC

CC

SE

C5

06

Secu

ring

Lin

ux/U

nix

GC

UX

SE

C5

79

Vir

tual

izat

ion

and

Pri

vate

Clo

ud

Secu

rity

SE

C4

01

Secu

rity

Ess

enti

als

Bo

otc

amp S

tyle

GSE

C

Pen

etra

tion

Tes

ting

SE

C4

01

Secu

rity

Ess

enti

als

Bo

otc

amp S

tyle

GSE

C

SE

C7

60

Adva

nced

Exp

loit

D

evel

opm

ent

for

Pen

etra

tio

n T

este

rs

SE

C5

60

Net

wo

rk P

en

Tes

ting

and

E

thic

al H

acki

ngG

PEN

SE

C6

42

Adva

nced

W

eb A

pp P

en T

esti

ng

and E

thic

al H

acki

ng

SE

C5

42

Web

App P

en

Tes

ting

and

E

thic

al H

acki

ngG

WA

PT

SE

C6

17

Wir

eles

s E

thic

al

Hac

king

, Pen

Tes

ting

, an

d D

efen

ses

GA

WN

SE

C5

75

Mo

bile

Dev

ice

Se

curi

ty a

nd

Eth

ical

Hac

king

GM

OB

SE

C5

61

Imm

ersi

ve H

ands-

On

Hac

king

Tec

hniq

ues

SE

C5

73

Pyt

hon

for

Pen

etra

tio

n T

este

rsG

PY

C

SE

C5

67

Soci

al E

ngin

eeri

ng fo

r Pen

etra

tio

n T

este

rs

SE

C5

80

Met

asplo

it K

ung

Fu

for

Ent

erpri

se

Pen

Tes

ting

SE

C5

62

Cyb

erC

ity

H

ands-

on

Kin

etic

C

yber

Ran

ge

Exe

rcis

e

NE

TW

OR

K

& E

XP

LO

ITS

WE

BM

OB

ILE

/WIR

EL

ESS

LA

B-C

EN

TE

RE

DSP

EC

IALI

ZA

TIO

N

SE

C6

60

Adva

nced

Pen

etra

tio

n T

esti

ng,

Exp

loit

Wri

ting

, and

E

thic

al H

acki

ngG

XP

N

MA

NA

GE

ME

NT

C

UR

RI

CU

LU

M

MG

T5

25

IT P

roje

ct

Man

agem

ent,

Effe

ctiv

e C

omm

unic

atio

n &

P

MP

® E

xam

Pre

pG

CP

M

MG

T4

33

Secu

ring

The

H

uman

: H

ow

to

Bui

ld,

Mai

ntai

n an

d M

easu

re a

Hig

h-Im

pact

Aw

aren

ess

Pro

gram

DE

VE

LO

PE

R

CU

RR

IC

UL

UM

CO

RE

FO

UN

DA

TIO

NA

L

SP

EC

IAL

IZA

TIO

N

SE

CU

RE

CO

DIN

G

DE

V5

41

Secu

re C

odi

ng

in J

ava/

JEE

GSS

P-J

AVA

DE

V5

43

Secu

re

Co

ding

in

C/C

++

DE

V5

44

Secu

re C

odi

ng

in .N

ET

GSS

P-.

NET

MG

T5

12

SAN

S Se

curi

ty L

eade

rshi

p E

ssen

tial

s fo

r M

anag

ers

wit

h K

now

ledg

e C

om

pres

sio

n™G

SLC

SP

EC

IAL

IZA

TIO

N

SE

C5

42

Web

App

Pen

Tes

ting

and

E

thic

al H

acki

ngG

WA

PT

SE

C6

42

Adv

ance

d W

eb A

pp

Pen

Tes

ting

and

E

thic

al H

acki

ng

MG

T4

14

SAN

S T

rain

ing

Pro

gram

fo

r C

ISSP

®

Cer

tific

atio

nG

ISP

Securin

g T

he

Hum

an f

or

Develo

pers

App

licat

ion

Secu

rity

A

war

enes

s M

odu

les

DE

V5

22

Def

endi

ng W

eb

App

licat

ions

Se

curi

ty E

ssen

tial

sG

WEB

DE

V5

34

Secu

re D

evO

ps:

A P

ract

ical

In

tro

duct

ion

DE

V5

31

Def

endi

ng M

obi

le

App

licat

ions

Sec

urit

y E

ssen

tial

s

PMP

is re

gist

ered

mar

k of

the

Proj

ect M

anag

emen

t Ins

titut

e, In

c.

MG

T5

14

IT S

ecur

ity

Stra

tegi

c P

lann

ing,

Po

licy,

an

d Lea

ders

hip

CO

RE

MG

T5

35

Inci

dent

R

espo

nse

Tea

m

Man

agem

ent

LE

G5

23

Law

of D

ata

Secu

rity

an

d In

vest

igat

ions

GLE

G

SE

C5

66

Impl

emen

ting

and

A

udit

ing

th

e C

riti

cal S

ecur

ity

C

ont

rols

– I

n-D

epth

GC

CC

AU

D5

07

Aud

itin

g &

M

oni

tori

ng N

etw

ork

s,

Per

imet

ers,

an

d Sy

stem

sG

SNA

Indu

stri

al C

ontr

ol

Syst

ems IC

S4

56

Ess

enti

als

for

NE

RC

Cri

tica

l In

fras

truct

ure

P

rote

ctio

n

ICS

51

5IC

S A

ctiv

e D

efen

se a

nd

Inci

den

t R

espo

nse

ICS

41

0IC

S/SC

AD

A

Secu

rity

E

ssen

tial

sG

ICSP

Secu

rity

Ope

rati

ons

Cen

ter/

Intr

usio

n D

etec

tion

EN

DP

OIN

T

MO

NIT

OR

ING

NE

TW

OR

K M

ON

ITO

RIN

G

SE

C4

01

Secu

rity

Ess

enti

als

Bo

otc

amp S

tyle

GSE

C

FO

R5

08

Adva

nce

d D

igit

al F

ore

nsi

cs,

Inci

den

t R

espo

nse

, an

d T

hre

at H

unti

ng

GC

FA

SE

C5

01

Adva

nce

d S

ecuri

ty

Ess

enti

als

– E

nte

rpri

se D

efen

der

GC

ED

TH

RE

AT

IN

TE

LL

IGE

NC

E

FO

R5

78

Cyb

er T

hre

at

Inte

llige

nce

SE

C5

03

Intr

usi

on

Det

ecti

on

In-D

epth

GC

IA

FO

R5

72

Adva

nce

d

Net

wo

rk

Fore

nsi

cs

and A

nal

ysis

GN

FA

SE

C5

11

Co

nti

nuo

us

Mo

nit

ori

ng

and

Secu

rity

Oper

atio

ns

GM

ON

SE

C5

50

Act

ive

Def

ense

, O

ffen

sive

C

ounte

rmea

sure

s,

and C

yber

D

ecep

tio

n

SE

C5

04

Hac

ker

To

ols

, Tec

hniq

ues,

Exp

loit

s,

and I

ncid

ent

Han

dlin

gG

CIH

SE

C5

50

Act

ive

Def

ense

, Offen

sive

C

oun

term

easu

res,

and

C

yber

Dec

epti

on

SE

C5

04

Hac

ker

To

ols

, Tec

hniq

ues

, E

xplo

its,

and I

nci

den

t H

andlin

gG

CIH

For i

nfor

mat

ion

on a

ll of

SA

NS’

cour

ses,

visit

www.

sans

.org/

cour

ses

GIAC

cer

tifica

tion

avai

labl

e

for

cour

ses

indi

cate

d wi

th

GIAC

acr

onym

s

FO

R5

08

Adva

nce

d D

igit

al F

ore

nsi

cs,

Inci

den

t R

espo

nse

, an

d T

hre

at H

unti

ng

GC

FA

FO

R5

08

Adva

nce

d D

igit

al F

ore

nsi

cs,

Inci

den

t R

espo

nse

, an

d T

hre

at H

unti

ng

GC

FA