SANS Secure India @Bangalore 2014



We would like to invite you to Bangalore where we will be hosting SANS Secure India @Bangalore 2014, 17 February - 8 March. Join us at the Royal Orchid Hotel in Bangalore where we will offer two great security courses. This event will be taught by SANS' top instructors who ensure that you not only learn the material, but that you can apply it immediately when you return to the office.

Choose one of these dynamic courses:
SEC503: Intrusion Detection In-Depth (GIAC-GCIA) presented by Johannes Ullrich, Ph.D.

Author Statement - When I was invited to be a member of a computer incident response team in the late 1990's (just after Al Gore invented the Internet), there was no formal cybersecurity training available. Consequently, I learned on the job and made my share (and then some) of mistakes. I was so naive that I tried to report an attack on our network by a host with an IP address in the 192.168 reserved private network, available for use by anyone. Needless to say, I got a very embarrassing enlightenment when someone clued me in.

With the benefit of experience and the passage of time, there are many lessons to be shared with you. This knowledge affords you the opportunity to learn and practice in the classroom to prepare you for the fast-paced, always-interesting job of intrusion detection analysts. - Judy Novak

SEC504: Hacker Techniques, Exploits & Incident Handling (GIAC-GCIH) presented by Jake Williams

Author Statement - My favorite part of teaching Hacker Techniques, Exploits, and Incident Handling is watching students when they finally get it. It's usually a two-stage process. First, students begin to realize how truly malicious some of these attacks are. Some students have a very visceral reaction, occasionally shouting out "Oh, shoot!" when they see what the bad guys are really up to. But if I stopped the process at that point, I'd be doing a disservice. The second stage is even more fun. Later in the class, students gradually realize that, even though the attacks are really nasty, they can prevent, detect, and respond to them. Using the knowledge they gain in this track, they know they'll be ready when a bad guy launches an attack against their systems. And being ready to thwart the bad guys is what it's all about. - Ed Skoudis

SEC575: Mobile Device Security and Ethical Hacking (GIAC-GMOB) presented by Tim Medin
I'm not sure exactly when it happened, but laptops and PC's have become legacy computing devices, replaced with mobile phones and tablets. Just when I thought we were getting a much better handle on the security of Windows, Mac and other Unix systems, there is an explosion of new devices wanting to join our networks that simply do not have the same security controls that we rely on in modern, secure networks.
Even with their weaknesses, mobile phones are here to stay and more and more we're being called on to support them. Some organizations try to drag their feet on allowing mobile phones, but that ultimately contributes to the problem: if we don't address security, the threats continue to grow uncontrolled and unmonitored.
Fortunately, we can securely deploy, manage and monitor mobile phones and tablets inside our organizations through policy and careful network deployment and monitoring. We need to build some essential skills in analyzing the risks of data leakage in mobile code and the applications our end-users want to run from app store, and we need to ethically hack our networks to identify the real threat and exposure of mobile phone weaknesses.
I wrote this course to help people build their skills in all these areas, focusing on the topics and concepts that are most important and immediately useful. Every organization should have an analyst who has the skills for mobile phone security analysis and deployment. By taking this course, you'll become an even more valued part of your organization, and we'll have lots of geeky fun in the process.
-Josh Wright

Available Courses:
SEC503: Intrusion Detection In-Depth
SEC504: Hacker Techniques, Exploits & Incident Handling - Jake Williams
SEC575: Mobile Device Security and Ethical Hacking - Tim Medin

Expected Number of Attendees

250

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, GSA, NASA, CIA, FEMA, FAA


This event has no exhibitor/sponsor opportunities


When
Mon, Feb 17 - Sat, Mar 8, 2014


Cost

SEC503: Intrusion Detection In-Depth:  $5450.00
SEC504: Hacker Techniques, Exploits:  $5670.00
SEC575: Mobile Device Security and Ethical Hacking:  $5670.00


Where
Royal Orchid Hotel
1, Golf Avenue
Bangalore, Bangalore IN
Get directions


Website
Click here to visit event website


Organizer
SANS Institute


Contact Event Organizer



Return to search results