Review and identify cybersecurity areas you need to master in these two-day tutorials and trainings. Check back soon to see more offerings.
Please note, these tutorials and trainings are available at an additional cost and can be added during the registration process.

Certificate of Cloud Security Knowledge (CCSK) Plus

Sunday, February 23 & Monday, February 24
9:00 AM – 5:00 PM
$2,200

The Certificate of Cloud Security Knowledge (CCSK) Plus class provides students a comprehensive review of cloud security fundamentals, prepares them to take the Cloud Security Alliance (CSA) CCSK v4 certificate exam and guides them through 6 hands on labs that tie cloud security best practices to real world applications. Starting with a detailed description of cloud computing, the course covers all major domains in the Security Guidance v4 document from the CSA, gives a high level overview of the CSA Cloud Controls Matrix (CCM) and includes recommendations from the European Network and Information Security Agency (ENISA) Cloud Computing document. This class is geared towards security professionals, but is also useful for anyone looking to expand their knowledge of cloud security. Having a basic understanding of security fundamentals, such as firewalls, secure development, encryption, and identity management is helpful, but not required. Individual laptop and some pre-class setup one week prior is required. 


You must be registered for RSA Conference 2020 to purchase and enroll in this training. By enrolling in this session, attendees are opting in to share their details with CSA  for certification purposes.

Register

SANS: Critical Security Controls: Planning, Implementing and Auditing

Sunday, February 23 & Monday, February 24
9:00 AM – 5:00 PM
$2,800

This course helps you master specific, proven techniques and tools needed to implement and audit the Critical Security Controls as documented by the Center for Internet Security (CIS). These Critical Security Controls, listed below, are rapidly becoming accepted as the highest priority list of what must be done and proven before anything else at nearly all serious and sensitive organizations. These controls were selected and defined by the US military and other government and private organizations (including NSA, DHS, GAO, and many others) who are the most respected experts on how attacks actually work and what can be done to stop them. They defined these controls as their consensus for the best way to block the known attacks and the best way to help find and mitigate damage from the attacks that get through. For security professionals, the course enables you to see how to put the controls in place in your existing network though effective and widespread use of cost-effective automation. For auditors, CIOs, and risk officers, the course is the best way to understand how you will measure whether the controls are effectively implemented.

By enrolling in this session, attendees are opting in to share their details with SANS for certification purposes.

Register

SANS: Driving Cybersecurity Change – Establishing a Culture of Protect, Detect and Respond

Sunday, February 23 & Monday, February 24
9:00 AM – 5:00 PM
$2,800

Cybersecurity is no longer just about technology it is ultimately about organizational change.  Change in not only how people think about security but what they prioritize and how they act, from the Board of Directors on down. Change management is a well-known concept for organizational change, but until now has not been formalized for Cybersecurity. As a result of this course you will be able to leverage the principles of organizational change and develop, maintain and measure a security driven culture.  In addition, through a series of interactive labs and exercises, you will apply these concepts to a variety of different large-scale security deployments. After this class you will be able to:
  • Explain what culture is, how it applies to cybersecurity, and how to understand and measure your security culture
  • Explain what organizational change is, identify different models for creating change and learn how to apply those models
  • Align this change to your organization’s strategy, including how to leverage different security frameworks and maturity models.
  • More effectively communicate to your Board and executives, collaborate with your peers and engage your workforce
  • Enable and secure your workforce by integrating security into all aspects of your organizational culture
  • Dramatically improve both time and impact of large-scale security deployments, to include exercises covering DevSecOps, Cloud, and EndPoint security.
  • Leverage numerous templates and resources from the course Digital Download Package and Community Forum that you can build on

By enrolling in this session, attendees are opting in to share their details with SANS for certification purposes. 

Register

SANS: Lethal Threat Hunting and Incident Response Techniques

Sunday, February 23 & Monday, February 24
9:00 AM – 5:00 PM
$2,800

Today, even the most impenetrable security measures aren’t enough to keep skilled adversaries out. Incident response teams must catch intrusions in progress, rather than after attackers have done significant damage. This process of “threat hunting” uses known adversary behaviors to examine the network and endpoints and proactively identify new data breaches.

This course prepares students with the advanced skills needed to hunt down, identify, counter, and recover from a wide range of enterprise network threats, including advanced persistent threats (APTs) from nation-state adversaries, organized crime syndicates, and hacktivists. The course is constantly updated with the rapidly evolving tactics and techniques used by elite responders and hunters in real-world breach cases. Audience:
  • Incident Response Team Members who regularly respond to complex security incidents/intrusions from APT groups/advanced adversaries and need to know how to detect, investigate, remediate, and recover from compromised systems across endpoints in the enterprise.
  • Threat Hunters who are seeking to understand threats more fully and how to learn from them in order to more effectively hunt threats and counter their tradecraft.
  • SOC Analysts looking to better understand alerts, build the skills necessary to triage events, and fully leverage advanced endpoint detection and response (EDR) capabilities.
  • Experienced Digital Forensic Analysts who want to consolidate and expand their understanding of memory and timeline forensics, investigation of technically advanced individuals, incident response tactics, and advanced intrusion investigations.
By enrolling in this session, attendees are opting in to share their details with SANS for certification purposes.

Register

SANS: Cybersecurity Writing: Hack the Reader 

Sunday, February 23 & Monday, February 24
9:00 AM – 5:00 PM
$2,800

Want to write better? Learn to hack the reader! Discover how to find an opening, break down your readers' defenses, and capture their attention to deliver your message--even if they're too busy or indifferent to others' writing. This unique course, built exclusively for cybersecurity professionals, will strengthen your writing skills and boost your security career.

Master the writing secrets that'll make you stand out in the eyes of your peers, colleagues, managers, and clients. Learn to communicate your insights, requests, and recommendations persuasively and professionally. Make your cybersecurity writing remarkable.
You will:
  • Uncover the five "golden elements" of effective reports, briefings, emails, and other cybersecurity writing.
  • Make these elements part of your arsenal through hands-on exercises that draw upon common security scenarios.
  • Learn the key topics you need to address in security reports and other written communications.
  • Understand how to pick the best words, structure, look, and tone.
  • Begin improving your skills at once by spotting and fixing weaknesses in security samples.
  • Receive practical checklists to ensure you'll write clearly and effectively right away.
Audience:
If your cybersecurity job involves writing emails, reports, proposals, or other content, you'll find this course indispensable, whether you are:
  • A manager or an individual team member
  • A consultant or an internally-focused employee
  • An expert or a beginner
  • A defender or an attacker
  • An earthling or an alien
  • You get the idea--the course is for all cybersecurity professionals who want to improve their written communications and boost their careers.

By enrolling in this session, attendees are opting in to share their details with SANS for certification purposes. 

Register

(ISC)² CISSP® with Access to Self-Paced

Sunday, February 23 & Monday, February 24
9:00 AM – 5:00 PM
$1,600

During this fast-paced, two-day session, the eight domains of the (ISC)² CISSP common body of knowledge (CBK®) will be covered. This fact-filled course will review the topics within the CBK and deepen the participant’s knowledge of information security. Each day of the presentation will cover essential topics within various domains of the CBK, such as current security challenges, problem resolution, application security, network security, infrastructure planning, legal considerations, international privacy, investigations, and forensics, among other topics. The instructor will utilize (ISC)² course materials to guide you through the most pertinent information to understand prior to taking the examination or to help enhance your current CISSP credential. The two-day session will conclude with a practice exam. For those students interested in deepening their knowledge, enrollment in this course also includes access to the Official (ISC)² On-Demand Training Seminar.

You must be registered for RSA Conference 2020 to purchase and enroll in this tutorial. By enrolling in this session, attendees are opting in to share their details with (ISC)² for certification purposes. 

Register

(ISC)² CCSP® Cloud Security Professional Two-Day Crash Course

Sunday, February 23 & Monday, February 24
9:00 AM – 5:00 PM
$1,600

During this fast-paced, two-day session you will cover the six domains covered by the (ISC)2 Certified Cloud Security Professional CBK. This fact-filled course will assist in your review of the CBK topics and deepen your knowledge of cloud computing and cloud information security. You will receive and utilize the official (ISC)2 Certified Cloud Security Professional certification credential study guide and materials published by (ISC)². The instructor will utilize (ISC)² course materials to guide you through the most pertinent information to understand prior to taking the examination or enhancing your current CISSP credential. The two-day session will conclude with a practice exam.  

Presentation: The facilitator will explain content to participants using PowerPoint to guide the presentation. Multiple examples will be used to clarify points.
Short Lecture/Discussion: The facilitator will engage participants in conversation by asking questions and encouraging them to respond. Participants will be encouraged to provide examples from their experience.

Computers: The course is presented to (ISC)² standards and will not require the course participants to have laptops or computer devices during the class presentation.

You must be registered for RSA Conference 2020 to purchase and enroll in this tutorial. By enrolling in this session, attendees are opting in to share their details with (ISC)² for certification purposes. 

Register