Protect you and your biz by learning the tricks of cyber criminals’ trade at SANS London in March
Promo However sophisticated computer systems become, skilled and determined cyber criminals manage to find endless new and more ingenious ways of breaking in to steal data or hold organisations to ransom.
As a security professional, are you confident you have the skills and knowledge to keep all potential attackers at bay and fend off anything they throw at you?
Whatever your particular area of interest, you will be able to fill any gaps in your knowledge at the upcoming training event staged by leading IT security training and certification specialist SANS Institute in London, England, from 11 to 16 March.
Ten intensive courses are on offer, designed to suit all levels from security novice to seasoned expert. All provide the opportunity to gain valuable GIAC certification and promise to arm attendees with defensive weapons they can put to use as soon as they return to work.
Choose between the following courses:
- Introduction to cyber security
Jump-start your security education with this basic five-day course covering terminology, networks, security policies, incident response, passwords and cryptography. - Security essentials bootcamp style
Would you be able to find compromised systems on your network? Learn how to set up proper security metrics and communicate them to your executives. - Hacker tools, techniques, exploits and incident handling
Follow a step-by-step response to computer incidents that illustrates issues such as employee monitoring, working with law enforcement and handling evidence. - Continuous monitoring and security operations
If attackers can find a way past perimeter security they will be able to achieve what they came for. Learn to detect dangerous anomalies and nip intrusions in the bud. - Mobile device security and ethical hacking
Mobile devices can be an organisation’s biggest security headache. Explore the strengths and weaknesses in Apple iOS and Android devices. - Advanced Web app penetration testing, ethical hacking and exploitation techniques
As applications continue to evolve, catch up with new frameworks and backends, delve into practical cryptography and examine new protocols such as HTTP/2 and WebSockets. - Advanced penetration testing, exploit writing and ethical hacking
A course for experienced penetration testers. Walk through dozens of real-world attacks and sharpen your skills in hands-on lab sessions. - Advanced Incident Response, Threat Hunting, and Digital Forensics
It’s important to catch any intrusions in progress rather than after attackers have done their worst. Study the signs of criminal behaviour to identify data breaches. - Advanced memory forensics and threat detection
This course on Windows memory forensics for incident investigators uses freeware and open-source tools to examine RAM content that shows what happened on a system. - Secure DevOps and cloud application security
How to build and deliver secure software using DevOps and and Amazon Web Services using popular open-source tools such as GitLab, Puppet, Jenkins, Vault, Graphana and Docker.
More information and registration details are right here.
Sponsored: Top 5 Threat Hunting Myths
READ MORE HERE