Menu

Tutorials & Trainings

Tutorials Sunday and Monday

Immerse yourself in an intensive, skill-building 2-day session led by respected authorities from the SANS Institute.

SANS: Critical Security Controls: Planning, Implementing and Auditing

Dates: Sunday, March 3 & Monday, March 4
Times: 9 AM – 5 PM 
Cost: $2,640

Speaker:
 James Tarala

Abstract: 
This course helps you master specific, proven techniques and tools needed to implement and audit the Critical Security Controls as documented by the Center for Internet Security (CIS). These Critical Security Controls, listed below, are rapidly becoming accepted as the highest priority list of what must be done and proven before anything else at nearly all serious and sensitive organizations. These controls were selected and defined by the US military and other government and private organizations (including NSA, DHS, GAO, and many others) who are the most respected experts on how attacks actually work and what can be done to stop them. They defined these controls as their consensus for the best way to block the known attacks and the best way to help find and mitigate damage from the attacks that get through. For security professionals, the course enables you to see how to put the controls in place in your existing network though effective and widespread use of cost-effective automation. For auditors, CIOs, and risk officers, the course is the best way to understand how you will measure whether the controls are effectively implemented.

Register Now

SANS: Security Awareness - How to Build, Maintain and Measure a Mature Awareness Program

Dates: Sunday, March 3 & Monday, March 4
Times: 9 AM – 5 PM 
Cost: $2,640

Speaker: Lance Spitzner

Abstract: Organizations have invested a tremendous amount of money and resources into securing technology, but little if anything into securing their employees and staff. As a result, people, not technology, have become their weakest link in cybersecurity. The most effective way to secure the human element is to establish a high-impact security awareness program that goes beyond just compliance and changes behaviors. This intense two-day course will teach you the key concepts and skills needed to build, maintain and measure just such a program. All course content is based on lessons learned from hundreds of security awareness programs from around the world. You will learn not only from your instructor, but from extensive interaction with your peers, as well. Please bring example materials from your security awareness program that you can show and share with other students during the course.

Register Now

SANS: Lethal Threat Hunting and Incident Response Techniques

Dates: Sunday, March 3 & Monday, March 4
Times: 9 AM – 5 PM 
Cost: $2,640

Speaker: Eric ZImmerman

Abstract: Prevention systems alone are insufficient to counter focused human adversaries who know how to get around most security and monitoring tools. The key is to look constantly for attacks that get past security systems and to catch intrusions in progress rather than after attackers have completed their objectives and done worse damage to the organization. For the incident responder, this process is referred to as “threat hunting.” Threat Hunting is using known adversary behaviors to examine proactively the network and endpoints identifying new data breaches. Incident response and threat hunting teams are the keys to identifying and observing malware indicators, patterns of activity, to help generate accurate threat intelligence that can be used to help detect current and future intrusions.

Register Now

SANS: Automating Information Security with Python

Dates: Sunday, March 3 & Monday, March 4
Times: 9 AM – 5 PM 
Cost: $2,640

Speaker: Mark Baggett

Abstract: Python is a simple, user-friendly language that is designed to make automating the tasks that security professionals perform quick and easy. Whether you are new to coding or have been coding for years, Automating Information Security with Python will have you creating programs that make your job easier and make your work more efficient. This self-paced course starts from the very beginning, assuming you have no prior experience or knowledge of programming. We cover all of the essentials of the language up front. If you already know the essentials, you will find that the pyWars lab environment allows advanced developers to quickly accelerate to more advanced material in the course.

Automating Information Security with Python is designed to give you the skills you need for tweaking, customizing, or outright developing your own tools. We put you on the path of creating your own tools, empowering you to better automate the daily routine of today's information security professional and to achieve more value in less time. Again and again, organizations serious about security emphasize their need for skilled tool builders. There is a huge demand for people who can understand a problem and then rapidly develop prototype code to attack or defend against it.

Register Now

Trainings Sunday and Monday

Review and identify information security areas you need to master in these two-day trainings led by (ISC)², CSA and ISACA..

(ISC)² CCSP® Cloud Security Professional Two Day Crash Course

Dates: Sunday, March 3 & Monday, March 4
Times: 9 AM – 5 PM
Cost: $1,600

Speaker: Ben Malisow

Abstract: During this fast-paced, two-day session you will cover the six domains covered by the (ISC)² the Certified Cloud Security Professional CBK. This fact filled course will assist in your review of the CBK topics and deepen your knowledge of cloud computing and cloud information security. You will receive and utilize the official (ISC)² Certified Cloud Security Professional certification credential study guide and materials published by (ISC)².

You must be registered for RSA Conference 2019 to purchase and enroll in this training.

Register Now

(ISC)² CISSP® Certified Information Systems Security Professional Introduction

Dates: Sunday, March 3 & Monday, March 4
Times: 9 AM – 5 PM
Cost: $1,600

Speaker: Lyron Andrews

Abstract: During this fast-paced, two-day session, you will cover the eight domains of the (ISC)² CISSP CBK. This fact-filled course will assist in your review of the CBK topics and deepen your knowledge of information security. Each day of the presentation is divided into various domains of the CBK. These domains will cover essential topics such as current security challenges, problem resolution, application security, network security, infrastructure planning, legal considerations, international privacy, investigations, and forensics among other topics.

You must be registered for RSA Conference 2019 to purchase and enroll in this training.

Register Now

(ISC)² Security Architecture

Dates: Sunday, March 3 & Monday, March 4
Times: 9 AM – 5 PM
Cost: $1,600

Speaker: Kevin Stoffell

Abstract: Security Architecture Development is designed for information security professionals involved with enterprise-wide security planning or acquisition of systems and software that contain information security components. This course is designed to deliver an understanding of key security architecture concepts and implementation. This course overlaps with the Information Systems Security Architecture Professional (ISSAP) certification; however, the focus does not fully align with the certification syllabus.

You must be registered for RSA Conference 2019 to purchase and enroll in this training.

Register Now

CSA: The Cloud Computing Security Knowledge (CCSK) - Foundation Training 

Dates: Sunday, March 3 & Monday, March 4
Times: 9 AM – 5 PM 
Cost: $2,200

Speaker: Jon-Michael C. Brook, CISSP, CCSK, Certified AWS Solution Architect

Abstract: The Certificate of Cloud Security Knowledge (CCSK) Plus class provides students a comprehensive review of cloud security fundamentals, prepares them to take the Cloud Security Alliance (CSA) CCSK v4 certificate exam and guides them through 6 hands on labs that tie cloud security best practices to real world applications. Starting with a detailed description of cloud computing, the course covers all major domains in the Security Guidance v4 document from the CSA, gives a high level overview of the CSA Cloud Controls Matrix (CCM) and includes recommendations from the European Network and Information Security Agency (ENISA) Cloud Computing document. 

This class is geared towards security professionals, but is also useful for anyone looking to expand their knowledge of cloud security. Having a basic understanding of security fundamentals, such as firewalls, secure development, encryption, and identity management is helpful, but not required. Individual laptop and some pre-class setup one week prior is required.

You must be registered for RSA Conference 2019 to purchase and enroll in this training.

Register Now

ISACA: CISM 2-Day Cram to the Max Course

Dates: Sunday, March 3 & Monday, March 4
Times: 9 AM – 5 PM 
Cost: $1,200

Speaker: TBD

Abstract: Planning to take ISACA®’s Certified Information Security Manager® (CISM®) exam this year? Join your fellow CISM-exam candidates and an expert, CISM-certified instructor to get in some valuable study tips and insight! This CISM Exam Prep Course is an intensive, cram-style course that will cover some of the more challenging topics from the CISM job practice areas. Topics will include: information security governance, information risk management, information security program development and information security incident management. Drill through sample exam items, ask your most pressing questions and get the answers to build your confidence and make final preparations for exam day.

This course is specifically designed for those already preparing to sit for the CISM exam.
Continuing Professional Education (CPE) Credit Hours: 14.5

You must be registered for RSA Conference 2019 to purchase and enroll in this training.

Register Now

ISACA: CSX Linux Application and Configuration 

Dates: Sunday, March 3 & Monday, March 4
Times: 9 AM – 5 PM 
Cost: $1,200

Speaker: TBD

Abstract: The Cybersecurity Nexus™ (CSX) Linux Application and Configuration course provides students an understanding of Linux operating systems, commands, and capabilities. Students will work with real Linux systems in a hands-on network environment and will leverage commands, applications, and toolsets to complete tasks. Upon course completion, students will be able to proactively leverage Linux to navigate, connect, and enhance business systems and networks—valuable skills in the cybersecurity field. Additionally, the course prepares individuals for the CSX Linux Application and Configuration Certificate Exam which can be taken later. 

Continuing Professional Education (CPE) Credit Hours: 14.5

You must be registered for RSA Conference 2019 to purchase and enroll in this training.

Register Now

This document was retrieved from http://www.rsaconference.com/events/us19/agenda/trainings-tutorials on Sun, 16 Dec 2018 07:37:05 -0500.