Venture deep into cybersecurity at SANS Amsterdam this month: Full details inside

Learn the skills you need to fend off cybercriminals

Got Tips?

Promo The internet is full of hacking tools and bad guys only too eager to use them. To help organisations keep their precious data out of the criminals’ hands, IT security training specialist SANS Institute is planning an event in Amsterdam from 20-25 May, 2019, for cybersecurity professionals to develop hands-on skills to defend against determined and increasingly ingenious attackers.

Nine courses are scheduled at SANS Amsterdam, all taught by leading cyber security practitioners, and seven of them offering the chance to gain GIAC certification.

During the training event students will also have the opportunity to attend SANS@Night seminars where SANS instructors give presentations on the latest topics and challenges in the infoSec field.

Topics of discussion at SANS Amsterdam include:

Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
Improve your communication skills by avoiding the top 10 mistakes in cybersecurity writing. You'll learn by spotting and fixing problems in excerpts from security reports, emails, and other content you regularly create. Speaker: Lenny Zeltser

SANS Instructors Sarah Edwards and Nik Alleyne will both take the stage to talk about what it takes to get into cybersecurity and what they think makes a great Forensicator or Cyber Defender. These talks are the first in a series created by SANS to highlight the need for cyber security professionals in the some of the different areas cyber security is contrived off. IF you want to discover more about what it takes to get into Digital Forensics or Cyber Defence and why and how you continuously can train yourself to stay at the top of your game, then you don’t want to miss this.

Meanwhile, the courses available are:

Open-source intelligence (OSINT) gathering and analysis
A new course for system defenders, threat intelligence analysts, investigators, intelligence analysts and law enforcers. Discover legitimate ways to find and analyse potentially incriminating data in websites, apps and social media platforms.

Advanced incident response, threat hunting, and digital forensics
Rather than wait till the damage is done, look for attacks that get past security systems and catch intrusions in progress. Threat hunting uses known adversary behaviours to examine the network and identify intrusions by recognising malware indicators and patterns of activity.

Intrusion detection in-depth
Students ranging from seasoned analysts to novices with some TCP/IP background will learn the core skills and tools needed to detect and prevent intrusions.

Hacker tools, techniques, exploits, and incident handling
Gain hands-on experience in finding vulnerabilities and discovering intrusions that use the latest forms of attack as well as the familiar old ones. Examine such as employee monitoring, working with law enforcement and handling evidence.

Web app penetration testing and ethical hacking
Study the major web application flaws and how hackers exploit them. How will you convince your organisation to take the business risks seriously?

Wireless penetration testing and ethical hacking
Many organisations overlook wireless systems as a vulnerable attack surface. Identify and defend against threats not only to WiFi but also Bluetooth, ZigBee, Z-Wave, DECT, RFID, NFC and contactless smart cards.

Advanced penetration testing, exploit writing, and ethical hacking
Students with some penetration testing experience will walk through walk through dozens of real-world attacks. Gain in-depth knowledge of the most prominent attack vectors.

Mac and iOS forensic analysis and incident response
Investigators will dive deep into forensic and intrusion analysis of Mac and iOS in numerous hands-on scenarios.

Reverse engineering malware: malware analysis tools and techniques
Practical skills to help forensic investigators, incident responders, engineers and IT administrators examine malicious programs that target Windows system.

Full details of the courses, and how to register, are right here


Biting the hand that feeds IT © 1998–2020