Jay Armstrong National Account Manager
NetWars Continuous 4 Months of online access Designed for novice to advanced 5 levels of increasing complexity Automated hint system NetWars Tournament 1 or 2 day live challenge 5 Levels of increasing complexity Competitive environment interactive scoring NetWars Cyber City ICS / SCADA enabled model city Team-based Mission-oriented
SANS Education Continuum 1. SANS Securing The Human - Awareness Training for all personnel 2. SANS CyberTalent Assess a subset of personnel for those with aptitude for Cyber Talent. 3. SANS Training hands-on, hyper-current curriculum taught by the top-guns in the industry. 4. GIAC Certifications - Validate personnel with skill-based exams. 5. SANS NetWars continuing individual and team-based Cyber Range exercises. 6. SANS Masters Degree - Educate top candidates through STI
The data and insights to improve your team's performance. Talent assessment tool that provides a method to screen for aptitude and skills Existing Staff Candidates Four Areas of focus: Cyber Defense Penetration Testing Digital Forensics Application Security Format Web-based tool 30 question assessment 60 minutes allowed for completion
SANS provides intensive, hands-on, immersion training Highest quality 50+ courses covering basic security skills to cutting edge topics Courses updated several times per year to keep current Course material includes very thorough back-up material to provide post training value The world s best practitioner-instructors Practical steps for defending systems and applications Available in conference, online, private event, and local community event venues The SANS Promise - You will be able to apply our information security training the day you get back to the office.
Validates real-world competency Focuses on hands-on concepts Is highly respected among both industry leaders and technical practitioners Offers 26 different skills based certifications aligned with critical infosec job duties Many certs are ISO/ANSI 17024 accredited Several GIAC certifications are included under the DoD Directive 8570
Live In-Person Training SANS Conferences Private Events Local Community Venues Online Training Courses OnDemand Self-Paced Online Learning vlive Live Virtual Evening Courses Event Simulcast Attend Conference Courses without travel
Teaches the essential information security skills and techniques you need to protect and secure your organization's critical information assets and business systems in a hands on bootcamp-style format. Attendees learn: To develop effective security metrics that provide a focused playbook that IT can implement, auditors can validate, and executives can understand To analyze and assess the risk to your environment in order to drive the creation of a security roadmap that focuses on the right areas of security Practical tips and tricks to focus in on high-priority security problems within your organization and on doing the right things that will lead to security solutions that work The core areas of security and how to create a security program that is anchored on PREVENT-DETECT-RESPOND. Prepares students for the GIAC GSEC Certification Exam
Analyze attack techniques in-depth and learn how to apply industry-best defenses Gain hands-on experience in finding vulnerabilities and discovering intrusions This course provides a time-tested, step-by-step process for responding to computer incidents, and a detailed description of how attackers undermine systems so you can prepare, detect, and respond to them. Explore the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence. Addresses the latest cutting-edge insidious attack vectors, the "oldie-but-goodie" attacks that are still prevalent, and everything in between. Prepares attendees for the GIAC GCIH certification exam
Learn the best ways to test your own systems before the bad guys attack. Apply industry leading pen test techniques to help prioritize defense resources Understand the tools and techniques underlying today s most damaging attacks In-depth, hands on lessons (30+ labs) Designed for: Pen testers Red teamers Vulnerability testers Technical Auditors Forensics specialists Cyber Defenders Prepares attendees for GIAC-GPEN certification
This course will teach you how to strengthen your skills to undertake a proactive approach to security. Analyze a security architecture for deficiencies Apply the principles learned in the course to design a defensible security architecture Understand the importance of a detection-dominant security architecture and Security Operations Centers (SOC) Identify the key components of Network Security Monitoring (NSM)/Continuous Diagnostics and Mitigation (CDM)/Continuous Monitoring (CM) Implement robust Network Security Monitoring/Continuous Security Monitoring Determine requisite monitoring capabilities for a SOC environment Determine capabilities required to support continuous monitoring of key Critical Security Controls Utilize tools to support implementation of Continuous Monitoring per NIST guidelines SP 800-137 Prepares students for the GIAC GMON certification exam.
Jay Armstrong National Account Manager Partnerships jarmstrong@sans.org www.sans.org (614) 543.0357