sans.org
US Training Special Offering Special offerings are courses/tracks ouside of our normal track structure. Securing Windows 2000 - Gold Standard SANS Security Essentials Flight School Revese Engineeringing Malware CCNA +S MCNS +S Wireless Networks Building a syslog Infrastructure And many others. Track 1: SANS Security Essentials Bootcamp and the CISSP 10 Domains Maximize your training time and turbo-charge your career in security by learning both the CISSP 10 Domains needed to pass the CISSP exam and the full SANS Security Essentials curriculum needed to qualify for the GSEC certification. In this track, you will learn the language and underlying theory of computer security; This course meets both of the key promises SANS makes to our students: You will gain up-to-the-minute knowledge you can put into practice immediately upon returning to work and SANS identifies the best security instructors to teach their courses, by choosing from those who have ranked highest in a nine-year competition among potential security faculty. This program offers great teaching along with the ability to master the material needed for the two most popular certifications in information security: CISSP and GSEC. Track 2: Firewalls, Perimeter Protection and VPNs Remember the good old days when you could install "a firewall" and deem your perimeter to be secure? Well, today's attackers are creating and launching attacks specifically designed to circumvent firewalls; Commercial networking companies are even releasing "helpful" software that lets users tunnel all sorts of non-company-sanctioned applications right through firewalls via the http port. Gone are the days when a single security solution can lock down a network perimeter. In this course, students will learn about all the pieces required to really secure a network and keep it secure in today's incredibly hostile environment. Decoding IP packets, firewalls, intrusion detection, centralized logging and alerting, VPNs, auditing, and network design are all covered in depth, using real-world examples to illustrate the practical knowledge. Track 3: Intrusion Detection In-Depth This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the courses are either new or just updated to reflect the latest attack patterns. This series is jam-packed with network traces and analysis tips. The emphasis of this track is to familiarize students with TCP/IP, general network traffic analysis, and one specific network intrusion detection system - Snort. This track is not a comparison or demonstration of multiple NIDS. It is expected that with the knowledge acquired from this track, students will be better able to understand the qualities of a sound NIDS to make a wise selection for their site's particular needs. Track 4: Hacker Techniques, Exploits and Incident Handling Let's face it. If your organization is connected to the Internet or has any disgruntled employees, your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. By helping you understand attackers' tactics and strategies in detail, giving you hands-on experience in discovering vulnerabilities, and equipping you with a comprehensive incident handling plan, the in-depth information in this course helps you turn the tables on computer attackers. This course addresses the latest cutting-edge insidious attack vectors and the oldie-but-goodie attacks that are still so prevalent, and everything in between. Instead of merely teaching a few hack attack tricks, this course includes a time-tested, step-by-step process for responding to computer incidents, a detailed description of how attackers undermine systems so you can prepare, detect, and respond to them, and a hands-on workshop for discovering holes before the bad guys do. Additionally, the course explores the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence. This challenging course is particularly well suited to individuals who lead or are a part of an incident handling team. Furthermore, general security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks. This track can be used to prepare for the GIAC Certified Incident Handler (GCIH) certification. Track 5: Securing Windows The Securing Windows track is a comprehensive curriculum for securing Windows 2000 and Windows XP networks. This program brings the confusing complexity of Windows 2000/XP security into clear focus by starting with foundational security services, such as Active Directory and Group Policy, and advancing in a logical progression to particular products or features which rely on these foundations, such as IIS and IPSec. This track provides best practices for security, hands-on exercises, extensive documentation/screenshots in the book-like manuals, a CD-ROM of security/scripts and an objective account of Windows security (neither bashing Microsoft nor towing the party line). You cannot claim to be a Windows 2000/XP security expert without mastering the information and skills presented in Track 5 This track can be used to prepare for the GIAC Certified Windows Security Administrator (GCWN) certification. Track 6: Securing Unix The distributed denial of service attacks that incapacitated Yahoo and other high profile internet sites in February 2000 were all launched from improperly configured Unix systems. Hundreds of scripts are continuously searching the internet for vulnerable Unix systems. SANS is pleased to offer a Unix security certification track. This track can be used to prepare for the GIAC Certified Unix Security Administrator (GCUX) certification. The track provides in-depth coverage of Unix-specific security issues. We will look at how the Unix semantics for file storage, program execution, and memory layout help - or hinder! We will also look at the specific configuration choices needed to secure the most commonly used Unix servers: Apache, Sendmail, and more. You will see the exact steps necessary to secure the two most common Unix flavors: Solaris and Linux. All through the course, you will learn how to use freely available tools to handle security issues. We will cover the installation, basic use, and advanced options so that you can start using these tools as soon as you return to work. We will put these tools to use in the special section on Unix Forensics. We will also include a detailed section on the installation, configuration, basic use, and advanced operation of SSH, as it is so crucial for Unix system management. Track 7: Auditing Networks, Perimeters and Systems The recently expanded Auditing Track is the end product of the efforts of over one hundred skilled system, network and security administrators working with one common goal: to improve the state of information security. This track, like all SANS courses, is based on known and validated threats and vulnerabilities. These threats and vulnerabilities are explained based on validated information from real world situations that can be used to raise awareness within an organization and build an understanding of why auditing is important. From these threats and vulnerabilities, we build the countermeasures and defenses including instrumentation, metrics and auditing. The course begins with a high level introduction on methods and audit programs. It then takes you through all of the particulars of how you actually audit devices and IT systems ranging from firewalls and routers, all the way down to the underlying operating systems. You'll be able to use what you learn the day you get home. Four days out of the six days in the track wil...
|