1

The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

The Most Trusted Source for Information Security Training, Certification, and Research

INFORMATION SECURITYTRAINING

SAVE $400 Register and pay by July 11th Use code EarlyBird18

www.sans.org/tampa-clearwater

“ SANS provides high-quality training I can immediately apply to our organization. Classes are highly effective at relating concepts and tools to practical implementation. SANS has been instrumental in providing the knowledge to implement a secure posture within our organization. Thanks SANS!”-Nathan Ten Haken, First Citizens Bank

Protect Your Business | Advance Your CareerSeven hands-on, immersion-style courses taught by real-world practitioners

Cyber DefensePenetration TestingDigital Forensics

Security ManagementCritical Security Controls

See inside for courses offered in:

Tampa- Clearwater 2018Clearwater, FL | September 4-9

Page 2: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

Save $400 when you register and pay by July 11th using code EarlyBird18

Register today for SANS Tampa-Clearwater 2018! www.sans.org/tampa-clearwater

@SANSInstitute Join the conversation: #SANSTampa

Tampa-Clearwater 2018 SEPTEMBER 4-9

Evening Bonus Sessions Take advantage of these extra evening presentations and add more value to your training. Learn more on page 11

KEYNOTE: Everything You Ever Learned About Passwords Is Wrong – Keith Palmgren

Blockchain: Building Better Business Models Securely – G. Mark Hardy

SANS Instructors Fewer than 100 individuals are currently qualified and designated to teach as SANS Instructors worldwide. This select group of professionals includes recognized industry experts and real-world practitioners, all of whom have proven to be engaging teachers in the classroom. Their up-to-date examples and deep knowledge ensure that what you learn in class will be relevant to your job.For instructor bios, visit: www.sans.org/instructorsThe line-up of SANS Instructors for SANS Tampa-Clearwater 2018 includes:

SEC301 Introduction to Cyber Security - - - - - - - - - - - - - - - - - - -

SEC401 Security Essentials Bootcamp Style - - - - - - - - - - - - - - - -

SEC504 Hacker Tools, Techniques, Exploits & Incident Handling

SEC566 Implementing and Auditing the Critical Security Controls – In-Depth - - - - - - - - - - - - - -

FOR500 Windows Forensic Analysis - - - - - - - - - - - - - - - - - - - -

MGT414 SANS Training Program for CISSP® Certification - - - - - - -

MGT512 SANS Security Leadership Essentials for Managers with Knowledge Compression™ - - - - - - - - - - - - - - - - - - - - Page 10

Page 5

Page 6

Page 8

Page 9

Courses at a Glance TUE 9-4

WED 9-5

THU 9-6

FRI 9-7

SAT 9-8

SUN 9-9

Page 4

Page 7

Carlos Cajigas Certified Instructor

@Carlos_Cajigas

G. Mark Hardy Principal Instructor

@g_mark

Keith Palmgren Senior Instructor

@kpalmgren

Brian Ventura Instructor

@brianwifaneye

Paul A. Henry Senior Instructor

@phenrycissp

Russell Eubanks Certified Instructor

@russelleubanks

Jon Gorenflo Instructor

@flakpaket

Page 3: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

1

Page 4: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

Extend and Validate Your Training

• Four months of supplemental online review

• 24/7 online access to your course lectures, materials, quizzes, and labs

• Subject-matter-expert support to help you increase your retention of course material

• Distinguish yourself as an information security leader

• 30+ GIAC cybersecurity certifi cations available

• Two practice exams included

• Four months of access to complete the attempt

More Informationwww.sans.org/ondemand/bundles | www.giac.org

*GIAC and OnDemand Bundles are only available for certain courses.

Extend Your TrainingExperience with an OnDemand Bundle

Get Certifi ed withGIAC Certifi cations

Add an OnDemand Bundle OR GIAC Certifi cation Attemptto your course within seven days of this event to get bundle pricing.*

Special Pricing

“ The course content andOnDemand delivery method have both exceeded my expectations.”

-Robert Jones, Team Jones, Inc.

“ GIAC is the only certifi cation that proves you have hands-on technical skills.”

-Christina Ford, Department of Commerce

GIAC bundle price – $729OnDemand Bundle price – $729

Get StartedVisit www.sans.org/vouchers and submit the contact request form to have a SANS representative in your region call or email you within 24 business hours. Within as little as one week, your employees can begin their training.

Training Investment & Bonus FundsTo open a Voucher Account, an organization pays an agreed-upon training investment. Based on the amount of the training investment, that organization could be eligible to receive bonus funds.

Investment and bonus funds:• Can be applied to any live or online SANS training course, SANS Summit,

GIAC certifi cation, or certifi cation renewal* • Can be increased at any time by making additional investments• Need to be utilized within 12 months; however, the term can be extended

by investing additional funds before the end of the 12-month term* Current exceptions are the Partnership Program, Security Awareness Training, and SANS workshops hosted at events run by other companies.

Voucher Program

Flexibility & ControlThe online SANS Admin Tool allows organizations to manage their training at any time and from anywhere.

With the SANS Admin Tool, the Administrator can:• Approve and manage student enrollment• View fund usage in real time• View students’ certifi cation status and test results• Obtain OnDemand course progress by student per course

The SANS Voucher Program allows organizations to:

• Centrally administer their employee training and budget

• Potentially receive bonus funds based on their investment

• Potentially receive bonus funds • Potentially receive bonus funds

www.sans.org/vouchers2

Page 5: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

Extend and Validate Your Training

• Four months of supplemental online review

• 24/7 online access to your course lectures, materials, quizzes, and labs

• Subject-matter-expert support to help you increase your retention of course material

• Distinguish yourself as an information security leader

• 30+ GIAC cybersecurity certifi cations available

• Two practice exams included

• Four months of access to complete the attempt

More Informationwww.sans.org/ondemand/bundles | www.giac.org

*GIAC and OnDemand Bundles are only available for certain courses.

Extend Your TrainingExperience with an OnDemand Bundle

Get Certifi ed withGIAC Certifi cations

Add an OnDemand Bundle OR GIAC Certifi cation Attemptto your course within seven days of this event to get bundle pricing.*

Special Pricing

“ The course content andOnDemand delivery method have both exceeded my expectations.”

-Robert Jones, Team Jones, Inc.

“ GIAC is the only certifi cation that proves you have hands-on technical skills.”

-Christina Ford, Department of Commerce

GIAC bundle price – $729OnDemand Bundle price – $729

3

Page 6: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

4 Register at www.sans.org/tampa-clearwater | 301-654-SANS (7267)

To determine if SANS SEC301: Introduction to Cyber Security is right for you, ask yourself five simple questions:

▐ Do you have basic computer knowledge, but are new to cybersecurity and in need of an introduction to the fundamentals?

▐ Are you bombarded with complex technical security terms that you don’t understand?

▐ Are you a non-IT security manager who lays awake at night worrying that your company will be the next mega-breach headline story on the 6 o’clock news?

▐ Do you need to be conversant in basic security concepts, principles, and terms, even if you don’t need “deep in the weeds” detail?

▐ Have you decided to make a career change to take advantage of the job opportunities in cybersecurity and need formal training and certification?

If you answer yes to any of these questions, then the SEC301: Introduction to Cyber Security training course is for you. Students with a basic knowledge of computers and technology but no prior cybersecurity experience can jump-start their security education with insight and instruction from real-world security experts in SEC301.

This completely revised and comprehensive five-day course covers a wide range of baseline topics, including terminology, the basics of computer networks, security policies, incident response, passwords, and even an introduction to cryptographic principles. The hands-on, step-by-step learning format will enable you to grasp all the information presented even if some of the topics are new to you. You’ll learn fundamentals of cybersecurity that will serve as the foundation of your security skills and knowledge for years to come.

Written by a security professional with over 30 years of experience in both the public and private sectors, SEC301 provides uncompromising real-world insight from start to finish. The course prepares you for the Global Information Security Fundamentals (GISF) certification test, as well as for the next SANS course in this progression, SEC401: Security Essentials Bootcamp Style. It also delivers on the SANS promise: You will be able to use the knowledge and skills you learn in SEC301 as soon as you return to work.

Five-Day Program Tue, Sep 4 - Sat, Sep 8 9:00am - 5:00pm 30 CPEs Laptop Required Instructor: Keith Palmgren

Who Should Attend Anyone new to

cybersecurity and in need of an introduction to the fundamentals of security

Those who feel bombarded with complex technical security terms they don’t understand, but want to understand

Non-IT security managers who deal with technical issues and understand them and who worry their company will be the next mega-breach headline story on the 6 o’clock news

Professionals with basic computer and technical knowledge in all disciplines who need to be conversant in basic security concepts, principles, and terms, but who don’t need “deep in the weeds” detail

Those who have decided to make a career change to take advantage of the job opportunities in cybersecurity and need formal training and certification

Bundle OnDemand with this course

Keith Palmgren SANS Senior Instructor

@kpalmgren

Keith Palmgren is an IT security professional with over 30 years of experience specializing in the field. He began his career with the U.S. Air Force working with cryptographic keys and codes management. He also worked in what was at the time the newly-formed Air Force computer security department. Following the Air Force, Keith worked as an MIS director for a small company before joining AT&T/Lucent as a Senior Security Architect working on engagements with the DoD and the National Security Agency. Later, as Security Consulting Practice Manager for both Sprint and Netigy, Keith built and ran the security consulting practice. He was responsible for all security consulting world-wide and for leading dozens of security professionals on many consulting engagements across all business spectrums. For the last several years, Keith has run his own company, NetIP, Inc. He divides his time between consulting, training, and freelance writing projects. In his career, Keith has trained over 10,000 IT professionals and authored more than 20 IT security training courses including the SANS SEC301 course. Keith currently holds 10 computer security certifications (CISSP®, GSEC, GCIH, GCED, GISF, CEH, Security+, Network+, A+, CTT+).

SEC301: Introduction to Cyber Security

GISFInformation Security Fundamentalswww.giac.org/gisf

“ The course provided me with a lot of great information from a low to a high level. A lot of the concepts are something I will be able to use in my day-to-day job.”-Sandy Baguskas, Sandy Baguskas

Page 7: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

Learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that you can directly apply when you get back to work. Learn tips and tricks from the experts so that you can win the battle against the wide range of cyber adversaries that want to harm your environment.

Is SEC401: Security Essentials Bootcamp Style the right course for you?

STOP and ask yourself the following questions: ▐ Do you fully understand why some organizations get compromised

and others do not? ▐ If there were compromised systems on your network, are you

confident that you would be able to find them? ▐ Do you know the effectiveness of each security device and are you

certain that they are all configured correctly? ▐ Are proper security metrics set up and communicated to your

executives to drive security decisions?

If you do not know the answers to these questions, then the SEC401 course will provide the information security training you need in a bootcamp-style format that is reinforced with hands-on labs.

Learn to build a security roadmap that can scale today and into the future.

SEC401: Security Essentials Bootcamp Style is focused on teaching you the essential information security skills and techniques you need to protect and secure your organization’s critical information assets and business systems. Our course will show you how to prevent your organization’s security problems from being headline news in the Wall Street Journal!

Prevention is ideal but detection is a must.

With the rise in advanced persistent threats, it is almost inevitable that organizations will be targeted. Whether the attacker is successful in penetrating an organization’s network depends on the effectiveness of the organization’s defense. Defending against attacks is an ongoing challenge, with new threats emerging all of the time, including the next generation of threats. Organizations need to understand what really works in cybersecurity. What has worked, and will always work, is taking a risk-based approach to cyber defense. Before your organization spends a dollar of its IT budget or allocates any resources or time to anything in the name of cybersecurity, three questions must be answered:

▐ What is the risk? ▐ Is it the highest priority risk? ▐ What is the most cost-effective way to reduce the risk?

Security is all about making sure you focus on the right areas of defense. In SEC401 you will learn the language and underlying theory of computer and information security. You will gain the essential and effective security knowledge you will need if you are given the responsibility for securing systems and/or organizations. This course meets both of the key promises SANS makes to our students: (1) You will learn up-to-the-minute skills you can put into practice immediately upon returning to work; and (2) You will be taught by the best security instructors in the industry.

Six-Day Program Tue, Sep 4 - Sun, Sep 9 This course has extended bootcamp hours 9:00am - 7:00pm (Days 1-5) 9:00am - 5:00pm (Day 6) 46 CPEs Laptop Required Instructor: Paul A. Henry

Who Should Attend Security professionals

who want to fill the gaps in their understanding of technical information security

Managers who want to understand information security beyond simple terminology and concepts

Operations personnel who do not have security as their primary job function but need an understanding of security to be effective

IT engineers and supervisors who need to know how to build a defensible network against attacks

Administrators responsible for building and maintaining systems that are being targeted by attackers

Forensic specialists, penetration testers, and auditors who need a solid foundation of security principles to be as effective as possible at their jobs

Anyone new to information security with some background in information systems and networking

Bundle OnDemand with this course

DoDD8140

Meets DoDD 8140 (8570) Requirementswww.sans.org/8140

SANS Technology Institutewww.sans.edu

SEC401: Security Essentials Bootcamp Style

GSECSecurity Essentialswww.giac.org/gsec

Paul A. Henry SANS Senior Instructor

@phenrycissp

Paul Henry is one of the world’s foremost global information security and computer forensic experts, with more than 20 years of experience managing security initiatives for Global 2000 enterprises and government organizations worldwide. Paul is a principal at vNet Security, LLC and is keeping a finger on the pulse of network security as the security and forensic analyst at Lumension Security. Throughout his career, Paul has played a key strategic role in launching new network security initiatives to meet our ever-changing threat landscape. He also advises and consults on some of the world’s most challenging and high-risk information security projects, including the National Banking System in Saudi Arabia, the Reserve Bank of Australia, the U.S. Department of Defense’s Satellite Data Project, and both government as well as telecommunications projects throughout Southeast Asia. Paul is frequently cited by mainstream and trade print publications as an expert on computer forensics, technical security topics, and general security trends and serves as an expert commentator for network broadcast outlets such as FOX, NBC, CNN, and CNBC. In addition, Paul regularly authors thought leadership articles on technical security issues, and his expertise and insight help shape the editorial direction of key security publications, such as the Information Security Management Handbook, to which he is a consistent contributor. 5

Page 8: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

Jon is the founder of and principal consultant for Fundamental Security, a small consulting firm focused on penetration testing, incident response, and strategic security consulting. He has worked in Information Technology since 2004, and has focused on Information Security since 2006. Most recently, he was the Application Security Testing Manager for a Fortune 500 financial institution, and a Security Architect and Penetration Tester for a Fortune 500 retailer. In all, he has performed security engineering, security architecture, incident response, and penetration testing in the government, retail, and financial sectors. Passionate about security and leadership, he loves trying to ignite those passions in other people. Jon is proud to have served in the Army Reserve for 11 years, where he became a Warrant Officer and served one tour in Afghanistan. He currently maintains the GCIH, GPEN, GAWN, GMOB, CISSP®, and Security+ certifications.Jon Gorenflo

SANS Instructor

@flakpaket

The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection and one or two disgruntled employees (and whose does not!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. As defenders, it is essential we understand these hacking tools and techniques.

This course enables you to turn the tables on computer attackers by helping you understand their tactics and strategies in detail, giving you hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan. It addresses the latest cutting-edge insidious attack vectors, the “oldie-but-goodie” attacks that are still prevalent, and everything in between. Instead of merely teaching a few hack attack tricks, this course provides a time-tested, step-by-step process for responding to computer incidents, and a detailed description of how attackers undermine systems so you can prepare for, detect, and respond to them.

In addition, the course explores the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence. Finally, students will participate in a hands-on workshop that focuses on scanning, exploiting, and defending systems. This course will enable you to discover the holes in your system before the bad guys do!

The course is particularly well-suited to individuals who lead or are a part of an incident handling team. General security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks.

Six-Day Program Tue, Sep 4 - Sun, Sep 9 This course has extended hours 9:00am - 7:15pm (Day 1) 9:00am - 5:00pm (Days 2-6) 37 CPEs Laptop Required Instructor: Jon Gorenflo

Who Should Attend Incident handlers

Leaders of incident handling teams

System administrators who are on the front lines defending their systems and responding to attacks

Other security personnel who are first responders when systems come under attack

SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling

GCIHIncident Handlerwww.giac.org/gcih

“ I really appreciated Jon’s way of teaching, insight and passion. It kept me interested each and every day and I kept looking forward to the next day. Keep up the excellent work!”-Homer Rodriguez, Idaho Department of Finance

Bundle OnDemand with this course

DoDD8140

Meets DoDD 8140 (8570) Requirementswww.sans.org/8140

SANS Technology Institutewww.sans.edu

6 Register at www.sans.org/tampa-clearwater | 301-654-SANS (7267)

Page 9: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

7For course updates, prerequisites, special notes, or laptop requirements, visit www.sans.org/event/tampa-clearwater-2018/courses

Cybersecurity attacks are increasing and evolving so rapidly that it is more difficult than ever to prevent and defend against them. Does your organization have an effective method in place to detect, thwart, and monitor external and internal threats to prevent security breaches? This course helps you master specific, proven techniques and tools needed to implement and audit the Critical Security Controls as documented by the Center for Internet Security (CIS).

As threats evolve, an organization’s security should too. To enable your organization to stay on top of this ever-changing threat scenario, SANS has designed a comprehensive course that teaches students the Critical Security Controls, a prioritized, risk-based approach to security. Designed by private and public sector experts from around the world, the Controls are the best way to block known attacks and mitigate damage from successful attacks. They have been adopted by the U.S. Department of Homeland Security, state governments, universities, and numerous private firms.

The Controls are specific guidelines that CISOs, CIOs, IGs, systems administrators, and information security personnel can use to manage and measure the effectiveness of their defenses. They are designed to complement existing standards, frameworks, and compliance schemes by prioritizing the most critical threat and highest payoff defenses, while providing a common baseline for action against risks that we all face.

The Controls are an effective security framework because they are based on actual attacks launched regularly against networks. Priority is given to Controls that (1) mitigate known attacks (2) address a wide variety of attacks, and (3) identify and stop attackers early in the compromise cycle. The British government’s Center for the Protection of National Infrastructure describes the Controls as the “baseline of high-priority information security measures and controls that can be applied across an organisation in order to improve its cyber defence.”

SANS in-depth, hands-on training will teach you how to master the specific techniques and tools needed to implement and audit the Critical Controls. It will help security practitioners understand not only how to stop a threat, but why the threat exists, and how to ensure that security measures deployed today will be effective against the next generation of threats.

The course shows security professionals how to implement the Controls in an existing network through cost-effective automation. For auditors, CIOs, and risk officers, the course is the best way to understand how you will measure whether the Controls are effectively implemented.

Five-Day Program Tue, Sep 4 - Sat, Sep 8 9:00am - 5:00pm 30 CPEs Laptop Required Instructor: Russell Eubanks

Who Should Attend Information assurance

auditors System implementers or

administrators Network security

engineers IT administrators Department of Defense

personnel or contractors Staff and clients of

federal agencies Private sector

organizations looking to improve information assurance processes and secure their systems

Security vendors and consulting groups looking to stay current with frameworks for information assurance

Alumni of SEC440, SEC401, SEC501, SANS Audit classes, and MGT512

SEC566: Implementing and Auditing the Critical Security Controls – In-Depth

GCCCCritical Controlswww.giac.org/gccc

Bundle OnDemand with this course

SANS Technology Institutewww.sans.edu

“SEC566 is very relevant to the work/role I do in my organization. This course shows the ‘real’ important things to focus on in the sea of IT security topics.” -Cristiano Avenia,

Deutsche Bank

Russell Eubanks is Vice President and Chief Information Security Officer for the Federal Reserve Bank of Atlanta. He is responsible for developing and executing the Information Security strategy for both the Retail Payments Office and the Atlanta Reserve Bank. Russell has developed information security programs from the ground up and actively seeks opportunities to measurably increase their overall security posture. Russell is a handler for the SANS Internet Storm Center, serves on the Editorial Panel for the Critical Security Controls, and maintains securityeverafter.com. He holds a bachelor’s degree in computer science from the University of Tennessee at Chattanooga.

Russell Eubanks SANS Certified Instructor

@russelleubanks

Page 10: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

All organizations must prepare for cyber crime occurring on their computer systems and within their networks. Demand has never been greater for analysts who can investigate crimes like fraud, insider threats, industrial espionage, employee misuse, and computer intrusions. Government agencies increasingly require trained media exploitation specialists to recover key intelligence from Windows systems. To help solve these cases, SANS is training a new cadre of the world’s best digital forensic professionals, incident responders, and media exploitation masters capable of piecing together what happened on computer systems second by second.

FOR500: Windows Forensic Analysis focuses on building in-depth digital forensics knowledge of the Microsoft Windows operating systems. You can’t protect what you don’t understand, and understanding forensic capabilities and artifacts is a core component of information security. You’ll learn to recover, analyze, and authenticate forensic data on Windows systems. You’ll understand how to track detailed user activity on your network and how to organize findings for use in incident response, internal investigations, and civil/criminal litigation. You’ll be able to use your new skills to validate security tools, enhance vulnerability assessments, identify insider threats, track hackers, and improve security policies. Whether you know it or not, Windows is silently recording an unimaginable amount of data about you and your users. FOR500 teaches you how to mine this mountain of data.

Proper analysis requires real data for students to examine. The completely updated FOR500 course trains digital forensic analysts through a series of new hands-on laboratory exercises that incorporate evidence found on the latest Microsoft technologies (Windows 7/8/10, Office and Office365, cloud storage, Sharepoint, Exchange, Outlook). Students leave the course armed with the latest tools and techniques and prepared to investigate even the most complicated systems they might encounter. Nothing is left out —attendees learn to analyze everything from legacy Windows XP systems to just-discovered Windows 10 artifacts.

MASTER WINDOWS FORENSICS – YOU CAN’T PROTECT WHAT YOU DON’T KNOW ABOUT

Six-Day Program Tue, Sep 4 - Sun, Sep 9 9:00am - 5:00pm 36 CPEs Laptop Required Instructor: Carlos Cajigas

Who Should Attend Information security

professionals Incident response team

members Law enforcement officers,

federal agents, and detectives

Media exploitation analysts

Anyone interested in a deep understanding of Windows forensics

FOR500: Windows Forensic Analysis GCFEForensic Examinerwww.giac.org/gcfe

A native of San Juan, Puerto Rico, Carlos began his career with the West Palm Beach Police Department in Florida, first as a police officer and eventually as a digital forensics detective, examiner, and instructor specializing in computer crime investigations. During his law enforcement tenure, Carlos conducted examinations on hundreds of digital devices, from computers and mobile phones to GPS devices, and served as both a fact and expert witness. Today, Carlos is a senior incident response analyst at IBM, where he is responsible for responding to computer and network security threats for clients located in North and South America. In addition, he holds various certifications in the digital forensics field including EnCase Certified Examiner (ENCE), Certified Forensic Computer Examiner (CFCE) from IACIS, and the GIAC Certifications GCFE and GCFA.

Carlos Cajigas SANS Certified Instructor

@Carlos_Cajigas

Bundle OnDemand with this course

SANS Technology Institutewww.sans.edu

“This course is a must-do for all incident responders and computer security incident response team leads to be able to answer critical questions quickly and determine the scope of an incident.” -Brad Milhorn,

NTT Data Services

8 Register at www.sans.org/tampa-clearwater | 301-654-SANS (7267)

Page 11: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

9For course updates, prerequisites, special notes, or laptop requirements, visit www.sans.org/event/tampa-clearwater-2018/courses

Brian Ventura is an information security architect with more than 20 years of experience. With a diverse background in consulting, public and private sector work, and project management, Brian brings a comprehensive view of security and technology. As an architect, his current focus is on enterprise information security governance, risk and compliance. Brian advises public entities and private companies on security best practices generally and within large projects. Brian regularly speaks on the NIST CyberSecurity Framework, the CIS Controls and other security topics. He volunteers with ISSA and OWASP, focusing on educational opportunities and maturing the information security field. Brian completed his bachelor of science in information technology and security from Western Governors University and holds various industry certifications, including the CISSP® and various GIAC certifications.

Brian Ventura SANS Instructor

@brianwifaneye

SANS MGT414: SANS Training Program for CISSP® Certification is an accelerated review course that is specifically designed to prepare students to successfully pass the CISSP® exam.

MGT414 focuses solely on the eight domains of knowledge as determined by (ISC)2 that form a critical part of the CISSP® exam. Each domain of knowledge is dissected into its critical components, and those components are then discussed in terms of their relationship with one another and with other areas of information security.

After completing the course students will have: ▐ Detailed coverage of the eight domains of knowledge ▐ The analytical skills required to pass the CISSP® exam ▐ The technical skills required to understand each question ▐ The foundational information needed to become a Certified

Information Systems Security Professional (CISSP®)

External Product Notice:The CISSP® exam itself is not hosted by SANS. You will need to make separate arrangements to take the CISSP® exam. Please note as well that the GISP exam offered by GIAC is NOT the same as the CISSP® exam offered by (ISC)2.

Six-Day Program Tue, Sep 4 - Sun, Sep 9 This course has extended bootcamp hours 9:00am - 7:00pm (Day 1) 8:00am - 7:00pm (Days 2-5) 8:00am - 5:00pm (Day 6) 46 CPEs Laptop Not Needed Instructor: Brian Ventura

Who Should Attend Security professionals

who are interested in understanding the concepts covered on the CISSP® exam as determined by (ISC)2

Managers who want to understand the critical areas of information security

System, security, and network administrators who want to understand the pragmatic applications of the CISSP® eight domains

Security professionals and managers looking for practical ways the eight domains of knowledge can be applied to their current job

MGT414: SANS Training Program for CISSP® Certification

GISPInformation Security Professionalwww.giac.org/gisp

“ This training was a comprehensive overview of all topics covered in the CISSP® exam. All in attendance were there for a common goal, including the instructor. It was easy to follow, and the real-world examples given were priceless.” -Ron Pinnock, Navy Exchange Service Command

“ I am new in the domain and this course was the perfect opening – clear explanations, covering all the areas, presenting real-life examples, and great material to support the learning.” -Sorana Costache, Ubisoft

Bundle OnDemand with this course

DoDD8140

Meets DoDD 8140 (8570) Requirementswww.sans.org/8140

Page 12: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

10

This completely updated course is designed to empower advancing managers who want to get up to speed quickly on information security issues and terminology. You won’t just learn about security, you will learn how to manage security. Lecture sections are intense; the most common student comment is that it’s like drinking from a fire hose. The diligent manager will learn vital, up-to-date knowledge and skills required to supervise the security component of any information technology project. Additionally, the course has been engineered to incorporate the NIST Special Publication 800 (series) guidance so that it can be particularly useful to U.S. government managers and supporting contractors.Essential security topics covered in this management track include network fundamentals and applications, power, cooling and safety, architectural approaches to defense in depth, cyber attacks, vulnerability assessment and management, security policies, contingency and continuity planning, awareness management, risk management analysis, incident handling, web application security, and offensive and defensive information warfare, culminating with our management practicum. The material uses Knowledge Compression,™ special charts, and other proprietary SANS techniques to help convey the key points of critical slides and keep the information flow rate at a pace senior executives demand every teaching hour of the course. The course has been evaluated and approved by CompTIA’s CAQC program for Security+ 2008 to ensure that managers and their direct reports have a common baseline for security terminology and concepts. You will be able to put what you learn into practice the day you get back into the office.

Knowledge Compression™

Maximize your learning potential!Knowledge Compression™ is an optional add-on feature to a SANS class that aims to maximize the absorption and long-term retention of large amounts of data over a relatively short period of time. Through the use of specialized training materials, in-class reviews, examinations and test-taking instruction, Knowledge Compression™ ensures students have a solid understanding of the information presented to them. By attending classes that feature this advanced training product, you will experience some of the most intense and rewarding training programs SANS has to offer, in ways that you never thought possible!

Five-Day Program Tue, Sep 4 - Sat, Sep 8 This course has extended hours 9:00am - 6:00pm (Days 1-4) 9:00am - 4:00pm (Day 5) 33 CPEs Laptop Required Instructor: G. Mark Hardy

Who Should Attend All newly appointed

information security officers

Technically skilled administrators who have recently been given leadership responsibilities

Seasoned managers who want to understand what their technical people are telling them

MGT512: SANS Security Leadership Essentials for Managers with Knowledge Compression™

GSLCSecurity Leadershipwww.giac.org/gslc

Bundle OnDemand with this course

DoDD8140

Meets DoDD 8140 (8570) Requirementswww.sans.org/8140

SANS Technology Institutewww.sans.edu

G. Mark Hardy is founder and president of National Security Corporation. He has been providing cybersecurity expertise to government, military, and commercial clients for over 35 years, and is an internationally recognized expert and keynote speaker who has presented at over 250 events world-wide. He provides consulting services as a virtual CISO, expert witness testimony, and domain expertise in blockchain and cryptocurrency. G. Mark serves on the Advisory Board of CyberWATCH, an Information Assurance/Information Security Advanced Technology Education Center of the National Science Foundation. He is a retired U.S. Navy captain who was entrusted with nine command assignments, including responsibility for leadership training for 70,000 sailors. A graduate of Northwestern University, he holds a B.S. in computer science, a B.A. in mathematics, a master’s degree in business administration, and a master’s degree in strategic studies, and holds the GSLC, CISSP®, CISM and CISA certifications.

G. Mark Hardy SANS Principal Instructor

@g_mark

“This training was a great tool to assist me with leading my organization in the areas of (training, hiring, protection, prevention, incident response) security management.” -Eugene Cordo,

Kravet Inc.

Register at www.sans.org/tampa-clearwater | 301-654-SANS (7267)

Page 13: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

• Let employees train on their own schedule

• Tailor modules to address specific audiences

• Courses translated into many languages

• Test learner comprehension through module quizzes

• Track training completion for compliance reporting purposes

End UserCIP v5/6

ICS EngineersDevelopersHealthcare

Visit SANS Securing The Human atsecuringthehuman.sans.org

Security Awareness Training by the Most Trusted Source

Computer-based Training for Your Employees

Change Human Behavior | Manage Risk | Maintain Compliance | Protect Your Brand

Security Awareness Training by the Most Trusted Source

Protect Your EmployeesKeep your organization safe with flexible, computer-based training.

End UserCIP

ICS EngineersDevelopersHealthcare

• Train employees on their own schedule• Modify modules to address specific audiences• Increase comprehension – courses translated into many languages• Test learner comprehension through module quizzes• Track training completion for compliance reporting purposes

Learn more about SANS Security Awareness at:securingthehuman.sans.org

Change Human Behavior Manage Risk

Maintain Compliance Protect Your Brand

Bonus SessionsEnrich your SANS training experience! Evening talks by our instructors and selected subject-matter experts help you broaden your knowledge, hear from the voices that matter in computer security, and get the most for your training dollar.

KEYNOTE: Everything You Ever Learned About Passwords Is WrongKeith PalmgrenPerhaps the worst advice you can give a user is “choose a complex password.” The result is the impossible-to-remember password requiring the infamous sticky note on the monitor. In addition, that password gets used at a dozen sites at home, AND the very same password gets used at work. The final result ends up being the devastating password compromise. In this one-hour talk, we will look at the technical and non-technical (human nature) issues behind passwords. Attendees will gain a more complete understanding of passwords and receive solid advice on creating more easily remembered AND significantly stronger passwords at work and at home, for their users, for themselves and even for their children.

Blockchain: Building Better Business Models SecurelyG. Mark HardyBlockchain as a technology has been proposed as a solution to everything from frictionless currency transfer to tracking cargo on ships. With over $1 billion in venture funds invested and several hundred patents filed, every security professional must know the impact on organizations in terms of risk, volatility, and competitiveness. This talk will explain blockchain technology, how it can do much more than cryptocurrencies like Bitcoin, and the basics of “smart contracts.” We’ll separate the hype from the fact, and look at the security implications of placing corporate information in an unalterable distributed ledger. Most importantly, we’ll discuss how to identify business processes at your organization that can be improved or enabled by this technology (hint: if you just substitute blockchain for database, it’s not a good fit). Come explore the future of blockchain technology, and gain a working knowledge of how to provide a framework for utilizing and securing a technology considered as disruptive as the Internet was in the 1990s.

Register at www.sans.org/tampa-clearwater | 301-654-SANS (7267) 11

Page 14: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

12

Future Community SANS EventsLocal, single-course events are also offered throughout the year via SANS Community. Visit www.sans.org/community for up-to-date Community course information.

Charlotte Charlotte, NC Jul 9-14

SANSFIRE Washington, DC Jul 14-21

Boston Summer Boston, MA Aug 6-11

San Antonio San Antonio, TX Aug 6-11

New York City Summer New York, NY Aug 13-18

Northern VA – Alexandria Alexandria, VA Aug 13-18

Virginia Beach Virginia Beach, VA Aug 20-31

Chicago Chicago, IL Aug 20-25

San Francisco Summer San Francisco, CA Aug 26-31

Tampa-Clearwater Tampa, FL Sep 4-9

Baltimore Fall Baltimore, MD Sep 8-15

Network Security Las Vegas, NV Sep 23-28

Northern VA Fall – Tysons Tysons, VA Oct 13-20

Denver Denver, CO Oct 15-20

Seattle Fall Seattle, WA Oct 15-20

Houston Houston, TX Oct 29 - Nov 3

Dallas Fall Dallas, TX Nov 5-10

San Diego Fall San Diego, CA Nov 12-17

Austin Austin, TX Nov 26 - Dec 1

San Francisco Fall San Francisco, CA Nov 26 - Dec 1

Nashville Nashville, TN Dec 3-8

Santa Monica Santa Monica, CA Dec 3-8

Cyber Defense Initiative

Washington, DC Dec 11-18

Future Summit EventsSecurity Operations New Orleans, LA Jul 30 - Aug 6

Security Awareness Charleston, SC Aug 6-15

Data Breach New York City, NY Aug 20-27

Threat Hunting & Incident Response New Orleans, LA Sep 6-13

Alaska Anchorage, AK Sep 10-15

Oil & Gas Cybersecurity Houston, TX Oct 1-6

Secure DevOps Denver, CO Oct 22-29

Future Training Events

Page 15: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

Register online at www.sans.org/tampa-clearwaterWe recommend you register early to ensure you get your first choice of courses.Select your course and indicate whether you plan to test for GIAC certification. If the course is still open, the secure, online registration server will accept your registration. Sold-out courses will be removed from the online registration. Everyone with Internet access must complete the online registration form. We do not take registrations by phone.

Cancellation & Access PolicyIf an attendee must cancel, a substitute may attend instead. Substitution requests can be made at any time prior to the event start date. Processing fees will apply. All substitution requests must be submitted by email to [email protected]. If an attendee must cancel and no substitute is available, a refund can be issued for any received payments by August 15, 2018. A credit memo can be requested up to the event start date. All cancellation requests must be submitted in writing by mail or fax and received by the stated deadlines. Payments will be refunded by the method that they were submitted. Processing fees will apply.

Pay Early and Save*

DATE DISCOUNT DATE DISCOUNT

Pay & enter code by 7-11-18 $400.00 8-1-18 $200.00

*Some restrictions apply. Early bird discounts do not apply to Hosted courses.

Use code EarlyBird18 when registering early

SANS Voucher ProgramExpand your training budget! Extend your fiscal year. The SANS Voucher Program provides flexibility and may earn you bonus funds for training.

www.sans.org/vouchers

Registration Information

13

Hyatt Regency Clearwater 301 South Gulfview Blvd Clearwater, FL 33767 727-373-1234 www.sans.org/event/tampa-clearwater-2018/location

Hotel Information

Top 3 reasons to stay at the Hyatt Regency Clearwater1 No need to factor in daily cab

fees and the time associated with travel to alternate hotels.

2 By staying at the Hyatt Regency Clearwater, you gain the opportunity to further network with your industry peers and remain in the center of the activity surrounding the training event.

3 SANS schedules morning and evening events at the Hyatt Regency Clearwater that you won’t want to miss!

Feel the warm breeze, breathe in the fresh, salt air and step into the lobby of one of the most remarkable resorts along the Florida Gulf coast. Just steps away from the powdery-white sands and the turquoise-blue waters of the Gulf of Mexico, this Clearwater Beach resort offers world-class amenities, award-winning service and first-class event venues. Savor a sensual experience that puts you right on the shores of one of the world’s best beaches at the Hyatt Regency Clearwater.

Special Hotel Rates AvailableA special discounted rate of $184.00 S/D will be honored based on space availability. Additional deluxe rooms and suites are available at discounted rates.

Government per diem rooms are available with proper ID. These rates include high-speed Internet in your room and are only available through August 12, 2018.

Page 16: The Most Trusted Source for Information Security Training ... · Tampa-Clearwater 2018 includes: SEC301 Introduction to Cyber Security -----SEC401 Security Essentials Bootcamp Style-----

NewslettersNewsBites Twice-weekly, high-level executive summaries of the most important news relevant to cybersecurity professionals.

OUCH! The world’s leading monthly free security awareness newsletter designed for the common computer user.

@RISK: The Consensus Security Alert A reliable weekly summary of (1) newly discovered attack vectors, (2) vulnerabilities with active new exploits, (3) how recent attacks worked, and (4) other valuable data.

WebcastsAsk the Experts Webcasts SANS experts bring current and timely information on relevant topics in IT security.

Analyst Webcasts A follow-on to the SANS Analyst Program, Analyst Webcasts provide key information from our whitepapers and surveys.

WhatWorks Webcasts The SANS WhatWorks webcasts bring powerful customer experiences showing how end users resolved specific IT security issues.

Tool Talks Tool Talks are designed to give you a solid understanding of a problem, and how a vendor’s commercial tool can be used to solve or mitigate that problem.

5705 Salem Run Blvd. Suite 105 Fredericksburg, VA 22407

Save $400 when you pay for any 4-, 5-, or 6-day course and enter the code “EarlyBird18” by June 13th. www.sans.org/boston-summer

To be removed from future mailings, please contact [email protected] or (301) 654-SANS (7267). Please include name and complete address. NALT-BRO-Boston-2018

As the leading provider of information defense, security, and intelligence training to military, government, and industry groups, the SANS Institute is proud to be a Corporate Member of the AFCEA community.

Other Free Resources (No SANS account is necessary)• InfoSec Reading Room• Top 25 Software Errors• 20 Critical Controls• Security Policies• Intrusion Detection FAQs• Tip of the Day

• Security Posters• Thought Leaders• 20 Coolest Careers• Security Glossary• SCORE (Security Consensus

Operational Readiness Evaluation)

Join the SANS.org community today to enjoy these free resources at www.sans.org/account