the most trusted source for information security training ...€¦ · york city winter 2018 is the...

16
The Most Trusted Source for Information Security Training, Certification, and Research INFORMATION SECURITY TRAINING New York City Winter 2018 Protect Your Business | Advance Your Career Six hands-on, immersion-style courses taught by real-world practitioners Cyber Defense Penetration Testing Security Management Digital Forensics Critical Security Controls See inside for courses offered in: SAVE $400 Register and pay by Jan 3rd Use code EarlyBird18 www.sans.org/new-york-city-winter “SANS training always shares real-world tools and techniques from faculty who have actually done it.” -M. Cullen, Baker Tilly Feb 26 - Mar 3

Upload: others

Post on 01-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

The Most Trusted Source for Information Security Training,Certification, and Research

INFORMATION SECURITYTRAINING

New York City Winter 2018

Protect Your Business | Advance Your CareerSix hands-on, immersion-style courses taught by real-world practitioners

Cyber DefensePenetration Testing Security Management

Digital Forensics Critical Security Controls

See inside for courses offered in:

SAVE $400 Register and pay by Jan 3rd Use code EarlyBird18

www.sans.org/new-york-city-winter

“ SANS training always shares real-world tools and techniques from faculty who have actually done it.”-M. Cullen, Baker Tilly

Feb 26 - Mar 3

Page 2: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

Evening Bonus Sessions Take advantage of these extra evening presentations

and add more value to your training. Learn more on page 9.

KEYNOTE: Evolving Threats – Paul A. Henry

Malware Analysis: House Rules – Anuj Soni

Register today for SANS New York City 2018! www.sans.org/new-york-city-winter

@SANSInstitute Join the conversation: #SANSNYC

New York City WINTER 2018 FEB 26 - MAR 3

SANS Instructors SANS instructors are real-world practitioners who specialize in the subjects they teach. All instructors undergo rigorous training and testing in order to teach SANS courses, which guarantees what you learn in class will be up to date and relevant to your job. The SANS New York City Winter 2018 lineup of instructors includes:

Paul A. Henry Senior Instructor @phenrycissp

MON 2-26

TUE 2-27

WED 2-28

THU 3-1

FRI 3-2

SAT 3-3

SEC301 Intro to Information SecuritySEC401 Security Essentials Bootcamp StyleSEC504 Hacker Tools, Techniques, Exploits, and Incident HandlingSEC566 Implementing and Auditing the Critical Security Controls – In-DepthFOR508 Advanced Digital Forensics, Incident Response, and Threat HuntingMGT517 Managing Security Operations: Detection, Response,

and Intelligence

Page 4

Page 6

Page 7

Page 2

Page 3

Page 5

Courses at a Glance

The training campus for SANS New York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from Broadway and the magnetic vibes of midtown, this hotel is surrounded by iconic sights and unrivaled energy.

Save $400 when you register and pay by January 3rd using code EarlyBird18

Chris Christianson Certified Instructor @cchristianson

Anuj Soni Certified Instructor @asoni

Michael Murr Principal Instructor @mikemurr

David R. Miller Certified Instructor @DRM_CyberDude

Ismael Valenzuela Certified Instructor @aboutsecurity

Page 3: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

1

Page 4: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

“This course has helped me connect the dots and understand what my coworkers sing praises upon SANS on a daily basis. What a sigh of relief and happy I can finally join in with them.” -CASSANDRA WALTERS,

VYSTAR CREDIT UNION

“The instructor is phenomenal, engaging, articulate, a master of the material, and made day-one information very easy to follow.” -KEVIN FLAHERTY, DARPA

SEC301Intro to Information Security

GISF CertificationInformation Security Fundamentals

www.giac.org/gisf

Five-Day Program Mon, Feb 26 - Fri, Mar 2 9:00am - 5:00pm 30 CPEs Laptop Required Instructor: David R. Miller

To determine if the SANS SEC301 course is right for you, ask yourself five simple questions:

Do you have basic computer knowledge, but are new to information security and in need of an introduction to the fundamentals?

Are you bombarded with complex technical security terms that you don’t understand?

Are you a non-IT security manager (with some technical knowledge) who lays awake at night worrying that your company will be the next mega-breach headline story on the 6 o’clock news?

Do you need to be conversant in basic security concepts, principles, and terms, even if you don’t need “deep in the weeds” detail?

Have you decided to make a career change to take advantage of the job opportunities in information security and need formal training/certification?

If you answer yes to any of these questions, the SEC301: Intro to Information Security training course is for you. Jump-start your security knowledge by receiving insight and instruction from real-world security experts on critical introductory topics that are fundamental to information security. This completely revised five-day, comprehensive course covers everything from core terminology to the basics of computer networks, security policies, incident response, passwords, and even an introduction to cryptographic principles.

This course is designed for students who have a basic knowledge of computers and technology but no prior knowledge of cybersecurity. The hands-on, step-by-step teaching approach will enable you to grasp all of the information presented, even if some of the topics are new to you. You’ll learn the fundamentals of information security that will serve as the foundation of your InfoSec skills and knowledge for years to come.

Written by a security professional with over 30 years of experience in both the public and private sectors, SEC301 provides uncompromising real-world insight from start to finish. The course prepares you for the Global Information Security Fundamentals (GISF) certification test, as well as for the next course up the line, SEC401: Security Essentials Bootcamp Style. It also delivers on the SANS promise: You will be able to use the knowledge and skills you learn in SEC301 as soon as you return to work.

WITH THIS COURSE www.sans.org/ondemand

David R. Miller SANS Certified InstructorDavid has been a technical instructor since the early 1980s and has specialized in consulting, auditing, and lecturing on information system security, legal and regulatory compliance, and network engineering. David has helped many enterprises develop their overall compliance and security program, including through policy writing, network architecture design (including security zones), development of incident response teams and programs, design and implementation of public key infrastructures, security awareness training programs, specific security solution designs, such as secure remote access and strong authentication

architectures, disaster recovery planning and business continuity planning, and pre-audit compliance gap analysis and remediation. He serves as a security lead and forensic investigator on numerous enterprise-wide IT design and implementation projects for Fortune 500 companies, providing compliance, security, technology, and architectural recommendations and guidance. His current projects include work on Microsoft Windows Active Directory enterprise designs, security information and event management systems, intrusion detection and protection systems, endpoint protection systems, patch management systems, configuration monitoring systems, and enterprise data encryption for data at rest, in transit, in use, and within email systems. David is an author, lecturer and technical editor of books, curriculum, certification exams, and computer-based training videos. @DRM_CyberDude

architectures, disaster recovery planning and business continuity planning, and pre-audit compliance gap analysis and remediati

Register at www.sans.org/new-york-city-winter | 301-654-SANS (7267) 2

Page 5: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

Paul A. Henry SANS Senior InstructorPaul is one of the world’s foremost global information security and computer forensic experts, with more than 20 years’ experience managing security initiatives for Global 2000 enterprises and government organizations worldwide. Paul is a principal at vNet Security, LLC and is keeping a finger on the pulse of network security as the security and forensic analyst at Lumension Security. Throughout his career, Paul has played a key strategic role in launching new network security initiatives to meet our ever-changing threat landscape. He also advises and consults on some of the world’s most challenging and high-risk information

security projects, including the National Banking System in Saudi Arabia, the Reserve Bank of Australia, the U.S. Department of Defense’s Satellite Data Project, and both government and telecommunications projects throughout Southeast Asia. Paul is frequently cited by major publications as an expert on perimeter security, incident response, computer forensics, and general security trends, and serves as an expert commentator for network broadcast outlets, such as FOX, NBC, CNN, and CNBC. In addition, Paul regularly authors thought leadership articles on technical security issues, and his expertise and insight help shape the editorial direction of key security publications, such as the Information Security Management Handbook, to which he is a consistent contributor. Paul is a featured speaker at seminars and conferences worldwide, delivering presentations on diverse topics, such as anti-forensics, network access control, cyber crime, DDoS attack risk mitigation, perimeter security, and incident response. @phenrycissp

security projects, including the National Banking System in Saudi Arabia, the Reserve Bank of Australia, the U.S. Department of

For course updates, prerequisites, special notes, or laptop requirements, visit www.sans.org/event/new-york-city-winter-2018/courses 3

SEC401Security Essentials Bootcamp Style

GSEC CertificationSecurity Essentials

www.giac.org/gsec

Six-Day Program Mon, Feb 26 - Sat, Mar 3 9:00am - 7:00pm (Days 1-5) 9:00am - 5:00pm (Day 6) 46 CPEs Laptop Required Instructor: Paul A. Henry

Who Should Attend Security professionals who want to fill the gaps in their understanding of technical information security Managers who want to understand information security beyond simple terminology and concepts Operations personnel who do not have security as their primary job function but need an understanding of security to be e£ective IT engineers and supervisors who need to know how to build a defensible network against attacks Administrators responsible for building and maintaining systems that are being targeted by attackers Forensic specialists, penetration testers, and auditors who need a solid foundation of security principles to be as e£ective as possible at their jobs Anyone new to information security with some background in information systems and networking

This course will teach you the most effective steps to prevent attacks and detect adversaries with actionable techniques you can directly apply when you get back to work. You’ll learn tips and tricks from the experts so you can win the battle against the wide range of cyber adversaries who want to harm your environment.STOP and ask yourself the following questions:

Do you fully understand why some organizations get compromised and others do not? If there were compromised systems on your network, are you confident you would be able to find them? Do you know the e�ectiveness of each security device and are you certain they are all configured correctly? Are proper security metrics set up and communicated to your executives to drive security decisions?

If you do not know the answers to these questions, SEC401 will provide the information security training you need in a bootcamp-style format that is reinforced with hands-on labs.SEC401: Security Essentials Bootcamp Style teaches you the essential information security skills and techniques you need to protect and secure your organization’s critical information assets and business systems. Our course will show you how to prevent your organization’s security problems from being headline news in the Wall Street Journal!Prevention Is Ideal but Detection Is a MustWith the rise in advanced persistent threats, it is almost inevitable that organizations will be targeted. Whether the attacker is successful in penetrating an organization’s network depends on the effectiveness of the organization’s defense. Defending against attacks is an ongoing challenge, with new threats emerging all of the time, including the next generation of threats. Organizations need to understand what really works in cybersecurity. What has worked, and will always work, is taking a risk-based approach to cyber defense. Before your organization spends a dollar of its IT budget or allocates any resources or time to anything in the name of cybersecurity, three questions must be answered:

What is the risk? Is it the highest priority risk? What is the most cost-e�ective way to reduce the risk?

Security is all about making sure you focus on the right areas of defense. In SEC401 you will learn the language and underlying theory of computer and information security. You will gain the essential and effective security knowledge you will need if you are given the responsibility for securing systems and/or organizations. This course meets both of the key promises SANS makes to our students: (1) You will learn up-to-the-minute skills you can put into practice immediately upon returning to work; and (2) You will be taught by the best security instructors in the industry.

www.sans.eduWITH THIS COURSE

www.sans.org/ondemandwww.sans.org/8140

“This course has given me a broader perspective across the fundamental domains of information security.” -CHRIS DREWS, 3M

Page 6: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

Register at www.sans.org/new-york-city-winter | 301-654-SANS (7267) 4

“Excellent, real-world examples and demos, with step-by-step examples on how to respond to an attack. SEC504 is a must for everyone on the team.” -MIKE PYKE, VYSTAR CREDIT UNION

“The insights and personal experiences are priceless! SEC504 is a course every InfoSec person should take.” -RON FOUGHT, SIRIUS COMPUTER SOLUTIONS

SEC504Hacker Tools, Techniques, Exploits, and Incident Handling

GCIH CertificationIncident Handler

www.giac.org/gcih

Six-Day Program Mon, Feb 26 - Sat, Mar 3 9:00am - 7:15pm (Day 1) 9:00am - 5:00pm (Days 2-6) 37 CPEs Laptop Required (If your laptop supports only wireless, please bring a USB Ethernet adapter.) Instructor: Michael Murr

Who Should Attend Incident handlers

Leaders of incident handling teams

System administrators who are on the front lines defending their systems and responding to attacks

Other security personnel who are first responders when systems come under attack

The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection and one or two disgruntled employees (and whose does not!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. As defenders, it is essential we understand these hacking tools and techniques.

“As someone who works in information security but has never had to do a full incident report, SEC504 taught me all the proper processes and steps.”

-TODD CHORYAN, MOTOROLA SOLUTIONS

This course enables you to turn the tables on computer attackers by helping you understand their tactics and strategies in detail, giving you hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan. It addresses the latest cutting-edge, insidious attack vectors, the “oldie-but-goodie” attacks that are still prevalent, and everything in between. Instead of merely teaching a few hack attack tricks, this course provides a time-tested, step-by-step process for responding to computer incidents and a detailed description of how attackers undermine systems so you can prepare for, detect, and respond to those attacks. In addition, the course explores the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence. Finally, students will participate in a hands-on workshop that focuses on scanning, exploiting, and defending systems. This course will enable you to discover the holes in your system before the bad guys do!

The course is particularly well-suited to individuals who lead or are a part of an incident handling team. General security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks.

WITH THIS COURSE www.sans.org/ondemandwww.sans.org/cyber-guardian www.sans.org/8140www.sans.edu

Michael Murr SANS Principal InstructorMichael has been a forensic analyst with Code-X Technologies for over five years. He has conducted numerous investigations and computer forensic examinations, and has performed specialized research and development. Michael has taught SANS SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling; SANS FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting; and SANS FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques. He has also led SANS Online Training courses and is a member of the GIAC Advisory Board. Currently, Michael is working on an

open-source framework for developing digital forensics applications. Michael holds the GCIH, GCFA, and GREM certifications and has a degree in computer science from California State University at Channel Islands. Michael also blogs about digital forensics on his forensic computing blog (www.forensicblog.org). @mikemurr

open-source framework for developing digital forensics applications. Michael holds the GCIH, GCFA, and GREM certifications and

Page 7: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

For course updates, prerequisites, special notes, or laptop requirements, visit www.sans.org/event/new-york-city-winter-2018/courses 5

Cybersecurity attacks are increasing and evolving so rapidly that it is more difficult than ever to prevent and defend against them. Does your organization have an effective method in place to detect, thwart, and monitor external and internal threats to prevent security breaches? This course helps you master specific, proven techniques and tools needed to implement and audit the Critical Security Controls as documented by the Center for Internet Security (CIS).

As threats evolve, an organization’s security should too. To enable your organization to stay on top of this ever-changing threat scenario, SANS has designed a comprehensive course on how to implement the Critical Security Controls, a prioritized, risk-based approach to security. Designed by private and public sector experts from around the world, the Controls are the best way to block known attacks and mitigate damage from successful attacks. They have been adopted by the U.S. Department of Homeland Security, state governments, universities, and numerous private firms.

The Controls are specific guidelines that CISOs, CIOs, IGs, systems administrators, and information security personnel can use to manage and measure the effectiveness of their defenses. They are designed to complement existing standards, frameworks, and compliance schemes by prioritizing the most critical threat and highest payoff defenses, while providing a common baseline for action against risks that we all face.

The Controls are an effective security framework because they are based on actual attacks launched regularly against networks. Priority is given to Controls that (1) mitigate known attacks (2) address a wide variety of attacks, and (3) identify and stop attackers early in the compromise cycle. The British government’s Center for the Protection of National Infrastructure describes the Controls as the “baseline of high-priority information security measures and controls that can be applied across an organisation in order to improve its cyber defence.”

SANS’s in-depth, hands-on training will teach you how to master the specific techniques and tools needed to implement and audit the Critical Controls. It will help security practitioners understand not only how to stop a threat, but why the threat exists, and how to ensure that security measures deployed today will be effective against the next generation of threats.

The course shows security professionals how to implement the Controls in an existing network through cost-effective automation. For auditors, CIOs, and risk officers, the course is the best way to understand how you will measure whether the Controls are effectively implemented.

SEC566Implementing and Auditing the Critical Security Controls – In-Depth

GCCC CertificationCritical Controls

www.giac.org/gccc

Five-Day Program Mon, Feb 26 - Fri, Mar 2 9:00am - 5:00pm 30 CPEs Laptop Required Instructor: Chris Christianson

Who Should Attend Information assurance auditors System implementers or administrators Network security engineers IT administrators Department of Defense personnel or contractors Sta£ and clients of federal agencies Private sector organizations looking to improve information assurance processes and secure their systems Security vendors and consulting groups looking to stay current with frameworks for information assurance Alumni of SEC/AUD440, SEC401, SEC501, SANS Audit classes, and MGT512

www.sans.edu

WITH THIS COURSE www.sans.org/ondemand

“This training is very thought-provoking and a great call to action to better secure my company’s environment.” -BRETT HAMMOND, ETC

Chris Christianson SANS Certified InstructorChris Christianson is an information security consultant based in Northern California with 20 years of experience and many technical certifications including the GSEC, GCIH, GCIA, GREM, GPEN, GWAPT, GCCC, GISF, GCED, CISSP, CCSE, CCDP, CCNP, IAM, CEH, and IEM. He holds a bachelor of science in management information systems from the University of Atlanta. Before starting his own information security consultant services, he worked at Travis Credit Union for 21 years, where he was assistant vice president in the information technology department from 2012-2016. Chris has also been an expert speaker at conferences

and a contributor to numerous industry articles. @cchristiansonand a contributor to numerous industry articles.

Page 8: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

6 Register at www.sans.org/new-york-city-winter | 301-654-SANS (7267)

www.sans.edu

“FOR508 gives you the exact tools and information needed to modernize your incident response processes.” -SHAUN GATHERUM, NUSCALE POWER

“Great content that will directly help improve existing and new forensic processes in my organization.” -PETE RYAN, SERCO

FOR508Advanced Digital Forensics, Incident Response, and Threat Hunting

GCFA CertificationForensic Analyst

www.giac.org/gcfa

Six-Day Program Mon, Feb 26 - Sat, Mar 3 9:00am - 5:00pm 36 CPEs Laptop Required Instructor: Anuj Soni

Who Should Attend Incident response team members

Threat hunters

Experienced digital forensic analysts

Information security professionals

Federal agents and law enforcement o¦cials

Red team members, penetration testers, and exploit developers

SANS FOR500 and SEC504 graduates

FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting will help you to:

Detect how and when a breach occurred Identify compromised and a�ected systems Determine what attackers took or changed Contain and remediate incidents Develop key sources of threat intelligence Hunt down additional breaches using knowledge of the adversary

DAY 0: A 3-letter government agency contacts you to say an advanced threat group is targeting organizations like yours, and that your organization is likely a target. They won’t tell how they know, but they suspect that there are already several breached systems within your enterprise. An advanced persistent threat, aka an APT, is likely involved. This is the most sophisticated threat that you are likely to face in your efforts to defend your systems and data, and these adversaries may have been actively rummaging through your network undetected for months or even years.

This is a hypothetical situation, but the chances are very high that hidden threats already exist inside your organization’s networks. Organizations can’t afford to believe that their security measures are perfect and impenetrable, no matter how thorough their security precautions might be. Prevention systems alone are insufficient to counter focused, human adversaries who know how to get around most security and monitoring tools.

This in-depth incident response and threat hunting course provides responders and threat hunting teams with advanced skills to hunt down, identify, counter, and recover from a wide range of threats within enterprise networks, including APT nation-state adversaries, organized crime syndicates, and hactivism. Constantly updated, FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting addresses today’s incidents by providing hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to detect, counter, and respond to real-world breach cases.

G AT H E R YO U R I N C I D E N T R E S P O N S E T E A M – I T ’ S T I M E T O G O H U N T I N G !

www.sans.org/8140WITH THIS COURSE

www.sans.org/ondemandwww.sans.org/cyber-guardian

Anuj Soni SANS Certified InstructorAnuj Soni initially pursued a career fighting cybercrime for the thrill of the hunt. Now Anuj feeds his passion for technical analysis through his role as a senior threat researcher at Cylance, where he performs malware research and reverse engineering. Anuj also brings his problem-solving abilities to his position as a SANS Certified Instructor, which gives him the opportunity to impart his deep technical knowledge and practical skills to students. When teaching Reverse-Engineering Malware (FOR610) and Advanced Digital Forensics and Incident Response (FOR508), Anuj emphasizes establishing goals for

analysis, creating and following a process, and prioritizing tasks. Since entering the information security field in 2005, Anuj has performed numerous intrusion investigations to help government and commercial clients mitigate attacks against the enterprise. His malware hunting and technical analysis skills have resulted in the successful identification, containment, and remediation of multiple threat actor groups. @asoni

analysis, creating and following a process, and prioritizing tasks. Since entering the information security field in 2005, Anuj has

Page 9: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

For course updates, prerequisites, special notes, or laptop requirements, visit www.sans.org/event/new-york-city-winter-2018/courses 7

MGT517Managing Security Operations: Detection, Response, and Intelligence

Five-Day Program Mon, Feb 26 - Fri, Mar 2 9:00am - 5:00pm 30 CPEs Laptop Required Instructor: Ismael Valenzuela

Who Should Attend Information security managers

Security Operations Center managers, analysts, and engineers

Information security architects

IT managers

Operations managers

Risk management professionals

IT/system administration/network administration professionals

IT auditors

Business continuity and disaster recovery sta£

This course covers the design, operation, and ongoing growth of all facets of the security operations capabilities in an organization. An effective Security Operations Center (SOC) has many moving parts and must be designed to have the ability to adjust and work within the context and constraints of an organization. To run a successful SOC, managers need to provide tactical and strategic direction and inform staff of the changing threat environment, as well as provide guidance and training for employees. This course covers design, deployment, and operation of the security program to empower leadership through technical excellence.

The course covers the functional areas of Communications, Network Security Monitoring, Threat Intelligence, Incident Response, Forensics, and Self-Assessment. We discuss establishing security operations governance for:

Business alignment and ongoing adjustment of capabilities and objectives

Designing the SOC and the associated objectives of functional areas

Software and hardware technology required for performance of functions

Knowledge, skills, and abilities of sta�, as well as sta� hiring and training

Execution of ongoing operations

You will walk out of this course armed with a roadmap to design and operate an effective SOC tailored to the needs of your organization.

Course Author Statement“The inclusion of all functional areas of security operations is intended to develop a standardized program for an organization and express all necessary capabilities. Admittedly ambitious, the intention of the class is to provide a unified picture of coordination among teams with di£erent skillsets to help the business prevent loss due to poor security practices. I have encountered detrimental compartmentalization in most organizations. There is a tendency for specialists to look only at their piece of the problem, without understanding the larger scope of information security within an organization. Organizations are likely to perceive a Security Operations Center (SOC) as a tool, and not as the unification of people, processes, and technologies.

“This course provides a comprehensive picture of a SOC. Discussion on the technology needed to run a SOC is handled in a vendor-agnostic way. In addition, technology is addressed in a way that attempts to address both minimal budgets as well as budgets with global scope. The course outlines sta£ roles, addresses sta£ training through internal training and information-sharing, and examines the interaction between functional areas and data exchange.

“After attending this class, the participant will have a roadmap for what needs to be done in an organization seeking to implement security operations.”

-Christopher Crowley

“This course is simply outstanding! It pulls together best practice, standards, procedures, and materials [into a] framework to establish and manage a world-class security operational.” -MICHAEL CARTER, LDS CHURCH

Ismael Valenzuela SANS Certified InstructorIsmael Valenzuela founded one of the first IT security consultancies in Spain and has participated as a security professional in numerous projects across the globe over the past 17 years. As a top cybersecurity expert with a strong technical background and deep knowledge of penetration testing, security architectures, intrusion detection and computer forensics, Ismael has provided security consultancy, advice and guidance to large government and private organizations, including major EU Institutions and U.S. government agencies. Prior to his current role as Principal Engineer at McAfee, where he leads research

on threat hunting using machine-learning and expert-system driven investigations, Ismael led the delivery of Security Operations Center, incident response and forensics services for the Foundstone Services team within Intel globally. Previously, Ismael worked as Global IT Security Manager for iSOFT Group Ltd, one of the world’s largest providers of healthcare IT solutions, managing its security operations in more than 40 countries. He holds a bachelor’s degree in computer science from the University of Malaga (Spain), has a certificate in business administration , and holds many professional certifications, including: the highly regarded GIAC Security Expert (GSE #132) in addition to GREM, GCFA, GCIA, GCIH, GPEN, GCUX, GCWN, GWAPT, GSNA, GMON, CISSP, ITIL, CISM, and IRCA 27001 Lead Auditor from Bureau Veritas UK. @aboutsecurity

on threat hunting using machine-learning and expert-system driven investigations, Ismael led the delivery of Security Operations

Page 11: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

Bonus SessionsEnrich your SANS training experience! Evening talks led by our instructors and selected subject-matter experts help you broaden your knowledge, hear from the voices that matter in computer security, and get the most for your training dollar.

KEYNOTE: Evolving ThreatsPaul A. HenryFor nearly two decades, defenders have fallen into the crowd mentality trap. At the same time, attackers have clearly evolved both in terms of malware delivery vectors and attack methodology. Today, our defenses focus primarily on the gateway and on attempting to outwit attackers’ delivery methods. This leaves us woefully exposed, and according to a recent Data Breach Report, has resulted in 3,765 incidents, 806 million records exposed, and $157 billion in data breach costs in the past six years. The Evolving Threats presentation is updated monthly and provides insight into mitigations of our most current threats.

Malware Analysis: House RulesAnuj SoniWelcome to malware analysis. You’re invited to explore, examine, and enjoy. However, we strongly encourage you to review and respect the house rules to make the most of your experience. Whether this is your first time or you’re a frequent visitor, we hope this discussion of process and technical suggestions will be a helpful guide to the adventures ahead.

• Let employees train on their own schedule

• Tailor modules to address specific audiences

• Courses translated into many languages

• Test learner comprehension through module quizzes

• Track training completion for compliance reporting purposes

End UserCIP v5/6

ICS EngineersDevelopersHealthcare

Visit SANS Securing The Human atsecuringthehuman.sans.org

Security Awareness Training by the Most Trusted Source

Computer-based Training for Your Employees

Change Human Behavior | Manage Risk | Maintain Compliance | Protect Your Brand

Security Awareness Training by the Most Trusted Source

Protect Your EmployeesKeep your organization safe with flexible, computer-based training.

End UserCIP

ICS EngineersDevelopersHealthcare

• Train employees on their own schedule• Modify modules to address specific audiences• Increase comprehension – courses translated into many languages• Test learner comprehension through module quizzes• Track training completion for compliance reporting purposes

Learn more about SANS Security Awareness at:securingthehuman.sans.org

Change Human Behavior Manage Risk

Maintain Compliance Protect Your Brand

9

Page 12: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

10

Get StartedVisit www.sans.org/vouchers and submit the contact request form to have a SANS representative in your region call or email you within 24 business hours. Within as little as one week, your employees can begin their training.

Training Investment & Bonus FundsTo open a Voucher Account, an organization pays an agreed-upon training investment. Based on the amount of the training investment, that organization could be eligible to receive bonus funds.

Investment and bonus funds:• Can be applied to any live or online SANS training course, SANS Summit,

GIAC certification, or certification renewal* • Can be increased at any time by making additional investments• Need to be utilized within 12 months; however, the term can be extended

by investing additional funds before the end of the 12-month term* Current exceptions are the Partnership Program, Security Awareness Training, and SANS workshops hosted at events run by other companies.

Voucher Program

www.sans.org/vouchers

Flexibility & ControlThe online SANS Admin Tool allows organizations to manage their training at any time and from anywhere.

With the SANS Admin Tool, the Administrator can:• Approve and manage student enrollment• View fund usage in real time• View students’ certification status and test results• Obtain OnDemand course progress by student per course

The SANS Voucher Program allows organizations to:

• Centrally administer their employee training and budget

• Potentially receive bonus funds based on their investmentPotentially receive bonus funds Potentially receive bonus funds

Page 13: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

SANS Training FormatsWhether you choose to attend a training class live or online, the entire SANS team is dedicated to ensuring your training experience exceeds expectations.

Premier Training EventsOur most recommended format, live SANS training events feature SANS’s top instructors teaching multiple courses at a single time and location. This allows for:• Focused, immersive learning without the distractions of your

office environment• Direct access to SANS Certified Instructors• Interacting with and learning from other professionals• Attending SANS@Night events, NetWars tournaments, vendor

presentations, industry receptions, and many other activitiesOur premier live training events in North America, serving thousands of students, are held in Orlando, Washington DC, Las Vegas, New Orleans, and San Diego. Regional events with hundreds of students are held in most major metropolitan areas during the year. See page 12 for upcoming training events in North America.

SummitsSANS Summits focus one or two days on a single topic of particular interest to the community. Speakers and talks are curated to ensure the greatest applicability to participants.

Community SANS CoursesThe same SANS courses, courseware, and labs are taught by up-and-coming instructors in a regional area. Smaller classes allow for more extensive instructor interaction. No need to travel; commute each day to a nearby location.

Private ClassesBring a SANS Certified Instructor to your location to train a group of your employees in your own environment. Save on travel and address sensitive issues or security concerns in your own environment.

Live Classroom Instruction Online TrainingSANS Online successfully delivers the same measured learning outcomes to students at a distance that we deliver live in classrooms. More than 30 courses are available for you to take whenever or wherever you want. Thousands of students take our courses online and achieve certifications each year.

Top reasons to take SANS courses online:• Learn at your own pace, over four

months• Spend extra time on complex topics • Repeat labs to ensure proficiency

with skills• Save on travel costs• Study at home or in your o¨ce

Our SANS OnDemand, vLive, Simulcast, and SelfStudy formats are backed by nearly 100 professionals who ensure we deliver the same quality instruction online (including support) as we do at live training events.

“The decision to take five days away from the o«ce is never easy, but so rarely have I come to the end of a course and had no regret whatsoever. This was one of the most useful weeks of my professional life.” -Dan Trueman, Novae PLC

“I am thoroughly pleased with the OnDemand modality. From a learning standpoint, I lose nothing. In fact, the advantage of setting my own pace with respect to balancing work, family, and training is significant, not to mention the ability to review anything that I might have missed the first time.” -Kevin E., U.S. Army

11

Page 14: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

12

Future Training Events

Future Community SANS EventsLocal, single-course events are also offered throughout the year via SANS Community. Visit www.sans.org/community for up-to-date Community course information.

Security East New Orleans, LA Jan 8-13, 2018

Northern VA Winter . . . . . . . . . . Reston, VA . . . . . . . . . . . . Jan 15-20Las Vegas . . . . . . . . . . . . . . . . . Las Vegas, NV . . . . . .Jan 28 - Feb 2Miami . . . . . . . . . . . . . . . . . . . . Miami, FL . . . . . . . . .Jan 29 - Feb 3Scottsdale . . . . . . . . . . . . . . . . . Scottsdale, AZ . . . . . . . . . . Feb 5-10Southern California . . . . . . . . . Anaheim, CA . . . . . . . . . . Feb 12-17Dallas . . . . . . . . . . . . . . . . . . . . Dallas, TX . . . . . . . . . . . . Feb 19-24New York City Winter . . . . . . . . New York, NY . . . . . . Feb 26 - Mar 3San Francisco Spring . . . . . . . . San Francisco, CA . . . . . . Mar 12-17Northern VA Spring – Tysons . . McLean, VA . . . . . . . . . . . Mar 17-24 Pen Test Austin . . . . . . . . . . . . . Austin, TX . . . . . . . . . . . .Mar 19-24Boston Spring . . . . . . . . . . . . . . Boston, MA . . . . . . . . . . Mar 25-30

SANS 2018 Orlando, FL Apr 3-10

Baltimore Spring . . . . . . . . . . . . Baltimore, MD . . . . . . . . . Apr 21-28Seattle Spring . . . . . . . . . . . . . . Seattle, WA . . . . . . . . . . . Apr 23-28

Security West San Diego, CA May 11-18

Northern VA Reston Spring . . . . Reston, VA . . . . . . . . . . . May 20-25Atlanta . . . . . . . . . . . . . . . . . . . . Atlanta, GA . . . . . . . May 29 - Jun 3Rocky Mountain . . . . . . . . . . . . Denver, CO . . . . . . . . . . . . .Jun 4-9Crystal City . . . . . . . . . . . . . . . . Arlington, VA . . . . . . . . . . Jun 18-23Minneapolis . . . . . . . . . . . . . . . Minneapolis, MN . . . . . . .Jun 25-30Vancouver . . . . . . . . . . . . . . . . . Vancouver, BC . . . . . . . . .Jun 25-30

Future Summit EventsCyber Threat Intelligence . . . . . Bethesda, MD . . . . . .Jan 29 - Feb 5Cloud Security . . . . . . . . . . . . . . San Diego, CA . . . . . . . . . Feb 19-26ICS Security . . . . . . . . . . . . . . . . Orlando, FL . . . . . . . . . . .Mar 19-26Blue Team . . . . . . . . . . . . . . . . . Louisville, KY . . . . . . . . . . Apr 23-30Automotive Cybersecurity . . . . Chicago, IL . . . . . . . . . . . . May 1-8DFIR . . . . . . . . . . . . . . . . . . . . . . Austin, TX . . . . . . . . . . . . . Jun 7-14

Page 15: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

Register online at www.sans.org/new-york-city-winter

We recommend you register early to ensure you get your first choice of courses.Select your course and indicate whether you plan to test for GIAC certification. If the course is still open, the secure, online registration server will accept your registration. Sold-out courses will be removed from the online registration. Everyone with Internet access must complete the online registration form. We do not take registrations by phone.

Cancellation & Access PolicyIf an attendee must cancel, a substitute may attend instead. Substitution requests can be made at any time prior to the event start date. Processing fees will apply. All substitution requests must be submitted by email to [email protected]. If an attendee must cancel and no substitute is available, a refund can be issued for any received payments by February 7, 2018. A credit memo can be requested up to the event start date. All cancellation requests must be submitted in writing by mail or fax and received by the stated deadlines. Payments will be refunded by the method that they were submitted. Processing fees will apply. 13

Pay Early and Save*

DATE DISCOUNT DATE DISCOUNT

Pay & enter code by 1-3-18 $400.00 1-24-18 $200.00

*Some restrictions apply. Early bird discounts do not apply to Hosted courses.

Use code EarlyBird18 when registering early

Top 5 reasons to stay at the Sheraton New York Times Square Hotel1 All SANS attendees receive complimentary

high-speed Internet when booking in the SANS block.

2 No need to factor in daily cab fees and the time associated with travel to alternate hotels.

3 By staying at the Sheraton New York Times Square Hotel, you gain the opportunity to further network with your industry peers and remain in the center of the activity surrounding the training event.

4 SANS schedules morning and evening events at the Sheraton New York Times Square Hotel that you won’t want to miss!

5 Everything is in one convenient location!

Located in Times Square, steps away from Broadway and the magnetic vibes of midtown, this hotel is surrounded by iconic sights and unrivaled energy. The Sheraton combines superior meeting space with incomparable service and features all the onsite amenities needed for both an enriching and productive stay.

Special Hotel Rates AvailableA special discounted rate of $179.00 S/D will be honored based on space availability.

Government per diem rooms are available with proper ID upon check-in. These rates include high-speed Internet in your room and are only available through February 4, 2018.

Sheraton New York Times Square Hotel 811 7th Avenue 53rd Street New York, NY 10019 212-581-1000 www.sans.org/event/new-york-city-winter-2018/location

Registration Information

Hotel Information

SANS Voucher ProgramExpand your training budget! Extend your fiscal year. The SANS Voucher Program provides flexibility and may earn you bonus funds for training.

www.sans.org/vouchers

Page 16: The Most Trusted Source for Information Security Training ...€¦ · York City Winter 2018 is the Sheraton New York Times Square Hotel. Located in Times Square and steps away from

NewslettersNewsBites Twice-weekly, high-level executive summaries of the most important news relevant to cybersecurity professionals.

OUCH! The world’s leading monthly free security awareness newsletter designed for the common computer user.

@RISK: The Consensus Security Alert A reliable weekly summary of (1) newly discovered attack vectors, (2) vulnerabilities with active new exploits, (3) how recent attacks worked, and (4) other valuable data.

WebcastsAsk the Experts Webcasts SANS experts bring current and timely information on relevant topics in IT security.

Analyst Webcasts A follow-on to the SANS Analyst Program, Analyst Webcasts provide key information from our whitepapers and surveys.

WhatWorks Webcasts The SANS WhatWorks webcasts bring powerful customer experiences showing how end users resolved specific IT security issues.

Tool TalksTool Talks are designed to give you a solid understanding of a problem, and how a vendor’s commercial tool can be used to solve or mitigate that problem.

Other Free Resources (No portal account is necessary)• InfoSec Reading Room• Top 25 Software Errors• 20 Critical Controls• Security Policies• Intrusion Detection FAQs• Tip of the Day

• Security Posters• Thought Leaders• 20 Coolest Careers• Security Glossary• SCORE (Security Consensus

Operational Readiness Evaluation)

5705 Salem Run Blvd. Suite 105 Fredericksburg, VA 22407

Save $400 when you pay for any 4-, 5-, or 6-day course and enter the code “EarlyBird18” by December 27th. www.sans.org/dallas

To be removed from future mailings, please contact [email protected] or (301) 654-SANS (7267). Please include name and complete address. NALT-BRO-Dallas-2018

As the leading provider of information defense, security, and intelligence training to military, government, and industry groups, the SANS Institute is proud to be a Corporate Member of the AFCEA community.

Create a SANS Account today to enjoy these free resources at www.sans.org/account