Jay Armstrong
National Account Manager
NetWars Continuous 4 Months of online access
Designed for novice to advanced
5 levels of increasing complexity
Automated hint system
NetWars Tournament 1 or 2 day live challenge
5 Levels of increasing complexity
Competitive environment
interactive scoring
NetWars Cyber City ICS / SCADA enabled model city
Team-based
Mission-oriented
SANS Education Continuum
1.SANS Securing The Human -
Awareness Training for all
personnel
2. SANS CyberTalent – Assess a
subset of personnel for those
with aptitude for “Cyber”
Talent.
3. SANS Training – hands-on,
hyper-current curriculum taught
by the top-guns in the industry.
4. GIAC Certifications - Validate
personnel with skill-based
exams.
5. SANS NetWars – continuing
individual and team-based Cyber
Range exercises.
6.SANS Masters Degree - Educate
top candidates through STI
The data and insights to improve your team's performance.
Talent assessment tool that provides a method to screen for aptitude and skills Existing Staff
Candidates
Four Areas of focus: Cyber Defense Penetration Testing Digital Forensics Application Security
Format Web-based tool
30 question assessment
60 minutes allowed for completion
SANS provides intensive, hands-on, immersion training
Highest quality
50+ courses covering basic security skills to cutting edge topics
Courses updated several times per year to keep current
Course material includes very thorough back-up material to provide post training value
The world’s best practitioner-instructors
Practical steps for defending systems and applications
Available in conference, online, private event, and local community event venues
The SANS Promise - “You will be able to apply our information security training the day you get back to the office.”
Validates real-world competency
Focuses on hands-on concepts
Is highly respected among both industry leaders and technical practitioners
Offers 26 different skills based certifications aligned with critical infosec job duties
Many certs are ISO/ANSI 17024 accredited
Several GIAC certifications are included under the DoD Directive 8570
Live In-Person Training
SANS Conferences
Private Events
Local Community Venues
Online Training Courses
OnDemand – Self-Paced Online Learning
vLive – Live Virtual Evening Courses
Event Simulcast – Attend Conference Courses
without travel
Teaches the essential information security skills and techniques you need to protect and secure your organization's critical information assets and business systems in a hands on bootcamp-style format.
Attendees learn:
To develop effective security metrics that provide a focused playbook that IT can implement, auditors can validate, and executives can understand
To analyze and assess the risk to your environment in order to drive the creation of a security roadmap that focuses on the right areas of security
Practical tips and tricks to focus in on high-priority security problems within your organization and on doing the right things that will lead to security solutions that work
The core areas of security and how to create a security program that is anchored on PREVENT-DETECT-RESPOND.
Prepares students for the GIAC–GSEC Certification Exam
Analyze attack techniques in-depth and learn how to apply industry-best defenses
Gain hands-on experience in finding vulnerabilities and discovering intrusions
This course provides a time-tested, step-by-step process for responding to computer incidents, and a detailed description of how attackers undermine systems so you can prepare, detect, and respond to them.
Explore the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence.
Addresses the latest cutting-edge insidious attack vectors, the "oldie-but-goodie" attacks that are still prevalent, and everything in between.
Prepares attendees for the GIAC–GCIH certification exam
Learn the best ways to test your own systems
before the bad guys attack.
Apply industry leading pen test techniques to
help prioritize defense resources
Understand the tools and techniques underlying
today’s most damaging attacks
In-depth, hands on lessons (30+ labs)
Designed for:
Prepares attendees for GIAC-GPEN certification
• Pen testers
• Red teamers
• Vulnerability testers
• Technical Auditors
• Forensics specialists
• Cyber Defenders
This course will teach you how to strengthen your skills to
undertake a proactive approach to security.
Analyze a security architecture for deficiencies
Apply the principles learned in the course to design a defensible security
architecture
Understand the importance of a detection-dominant security architecture and
Security Operations Centers (SOC)
Identify the key components of Network Security Monitoring (NSM)/Continuous
Diagnostics and Mitigation (CDM)/Continuous Monitoring (CM)
Implement robust Network Security Monitoring/Continuous Security Monitoring
Determine requisite monitoring capabilities for a SOC environment
Determine capabilities required to support continuous monitoring of key Critical
Security Controls
Utilize tools to support implementation of Continuous Monitoring per NIST
guidelines SP 800-137
Prepares students for the GIAC – GMON certification exam.
Jay Armstrong
National Account Manager – Partnerships
www.sans.org
(614) 543.0357