Promo As data thieves and hackers become more inventive, and more destructive, learning how to protect networks from attack and threats is zooming up organizations’ lists of priorities.
Security training specialist SANS Institute is staging one of its renowned events in London from 8-13 April, providing a choice of courses for security professionals at all levels to learn the skills they need to protect their companies’ essential assets.
The lab-packed courses offer a chance to gain valuable GIAC Certification, and attendees are assured they will be able to put their newfound skills into practice immediately.
Choose between these courses:
Enterprise threat and vulnerability assessment: A new course designed for professionals securing 10,000 or more systems in mid-sized to large organisations. On the final day students’ newly learned skills are put to the test against an enterprise-grade cyber range.
Open-source intelligence (OSINT) gathering and analysis: How to find and analyse internet data, focusing on techniques used by threat intelligence analysts, private investigators, insurance claims investigators and law enforcement officers. Hands-on workshops will explore the live internet and dark web.
Security essentials bootcamp style: Would you be able to find compromised systems on your network? Do you know if each security device is configured correctly? Learn the answers plus how to set up proper security metrics and convey them to your executives.
Hacker tools, techniques, exploits, and incident handling: Follow a step-by-step response to computer incidents and examine legal issues such as employee monitoring, working with law enforcement and handling evidence.
Cloud security architecture and operations: An introduction to cloud security, policy and governance. Learn how to adapt security processes to the cloud and delve into incident handling, forensics and event management.
SIEM with tactical analytics: Logging systems collect vast amounts of data and proper analysis requires an understanding of the when, what and why behind the logs. Lab work uses SOF-ELK, a free security information and event management solution.
Windows forensic analysis: How to recover and analyse forensic data on Windows systems and track user activity on your network for incident response and investigations.
Advanced digital forensics, incident response, and threat hunting: Defenders need to catch intrusions in progress rather than after attackers have done their worst. Learn to recognise the criminal behaviours that could signal a data breach.
Advanced smartphone forensics: An in-depth course on the techniques investigators use to recover evidence from mobile devices.
All the information and sign-up details are right here.
Sponsored: Becoming a Pragmatic Security Leader