8 SANS courses in London, 29 February – 5 March, 2016

SANS London Spring runs from 29 February – 5 March and hosts eight SANS courses, led by SANS’ world-renowned instructors.

Choose from eight vital SANS course drawn from across the SANS curriculum:

– SEC401: Security Essentials Bootcamp Style
– AUD507: Auditing & Monitoring Networks, Perimeters & Systems
– SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
– SEC542: Web App Penetration Testing and Ethical Hacking
– SEC560: Network Penetration Testing and Ethical Hacking
– SEC760: Advanced Exploit Development for Penetration Testers
– FOR508: Advanced Digital Forensics and Incident Response
– FOR526: Memory Forensics In-Depth

For further information including full course descriptions and to register click here:
sans.org/u/cBu

**SANS London Spring 2016 Location**

All classes take place in The Grand Connaught Rooms, WC2 conveniently located in London’s theatre-land amongst the busy shops, bars, and restaurants of the West End.

** SANS London Spring 2016 Dates**

All courses run for 6 days. Each course takes place from Monday, 29 February to Saturday, 5 March.

**GIAC Certification**

Many courses at SANS London Spring have an associated GIAC examination.
The certification attempt is available at a reduced rate when bundled
with training. Add the OnDemand version of your course (also at a
discounted rate), to assist with your exam preparation.

**SANS London Spring 2016 Registration**

For full course descriptions, instructor profiles and online
registration click here: or contact SANS by
email: contact@sans.org
** SANS London Spring 2016 Training Line Up**

– SEC401: Security Essentials Bootcamp Style
Paul A. Henry – GSEC Certification

In this course, students learn the language and underlying theory of
computer and information security. Since all jobs today require an
understanding of security, this course will help you understand how
security applies to your job. In addition, students will gain the
essential and latest knowledge and skills required for effective
management of security systems and processes.

“A lot of very useful recommendations are given. The course gives an
excellent overview of state-of-the-art IT security topics and
technologies.” – Marco Cecchini, Swiss National Bank

Read more: sans.org/u/cCn

– AUD507: Auditing & Monitoring Networks, Perimeters & Systems
David Hoelzer – GSNA Certification

This course is organised to provide a risk-driven method for tackling
the enormous task of designing an enterprise security-validation
program. After covering a variety of high-level audit issues and general
audit best practices, the students will have the opportunity to dive
deep into the technical how-to for determining the key controls that can
be used to provide a level of assurance to an organisation.

“It gives an insight on different aspects related to systems
configurations and associated risks.” – Yosra Al-Basha, Yemen LNG Co
Read more: sans.org/u/cC8
– SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
Kevin Fiscus – GCIH Certification

Intense attack techniques and their associated defences are covered in
this course, so that offense can inform defence to improve the state of
security in your organisation by preparing you to handle incidents
caused by the latest threats.

“Caters to various levels of technical ability and relates actions and
activities to real issues, e.g. what risk does a vulnerability present
to your business.” – Armando Nardo, Ernst and Young LLP
Read more: sans.org/u/cBJ
– SEC542: Web App Penetration Testing and Ethical Hacking
Pieter Danhieux – GWAPT Certification

Through detailed, hands-on exercises, this intermediate to advanced
level course will provide you with the skills needed to perform web app
vulnerability discovery and exploitation for your organisation.

“The best course to take you from zero to hero in web penetration in six
days.” – Ali, Saudi Aramco

Read more: sans.org/u/cBO
– SEC560: Network Penetration Testing and Ethical Hacking (Newly updated)
Erik van Buggenhout – GPEN Certification

In-depth penetration testing skills learned in this course will prepare
you to conduct professional-grade pen tests, end-to-end, including
scoping, recon, scanning, exploitation, post-exploitation and more.

“I think if you genuinely want to learn how exploitation techniques work
and how to properly think like a hacker, it would be silly not to
attend.” – Mark Hamilton, McAfee

Read more: sans.org/u/cBz
– SEC760: Advanced Exploit Development for Penetration Testers
Jake Williams

SEC760 teaches the skills required to reverse-engineer 32-bit and 64-bit
applications, perform remote user application and kernel debugging,
analyse patches for 1-day exploits, and write complex exploit, such as
use-after-free attacks against modern software and operating systems.

“SEC760 is a kind of training we could not get anywhere else. It is not
a theory – we got to implement and to exploit everything we learned.” –
Jenny Kitaichit, Intel

Read more: sans.org/u/cBT
– FOR508: Advanced Digital Forensics and Incident Response
Jess Garcia – GCFA Certification

This in-depth incident response course provides responders with advanced
skills to hunt down, counter, and recover from a wide range of threats
within enterprise networks, including APT adversaries, organised crime
syndicates and hactivism. Constantly updated, the course provides
hands-on incident response tactics and techniques that elite responders
are successfully using in real-world breach cases today.

“Wow!! What a course! One of the best courses I have attended in my
learning career and glad I took this course specifically after passing
FOR408.” – Srinath Kannan, Accenture

Read more: sans.org/u/cBY

– FOR526: Memory Forensics In-Depth
Alissa Torres

This is a critical course for any serious DFIR investigator who wants to
tackle advanced forensics, trusted insider, and incident response cases.
In today’s forensic cases, it is just as critical to understand memory
structures, as it is to understand disk and registry structures. Having
in-depth knowledge of Windows memory internals allows the examiner to
access target date specific to the needs of the case at hand.

“The SANS Institute is currently the leader in the commercial IR and
Computer Forensic training market. They have a large number of quality
courses.” – Jason Luttgens, Matthew Pepe, Kevin Mandia, Incident
Response & Computer Forensics, Third Edition – July 2014

Read more: sans.org/u/cC3

Leave a Reply

Your email address will not be published. Required fields are marked *