Sans Emea Curriculum Overview Catalogue 2020
Sans Emea Curriculum Overview Catalogue 2020
Sans Emea Curriculum Overview Catalogue 2020
Cybersecurity
Career Paths
Find your path. Develop new skills. Prove your knowledge.
65+
hands-on
courses 120+
extraordinary
SANS-certified
instructors
35+
certifications
00
Select training and certifications
in alignment with your career path
120+
extraordinary
SANS-certified
instructors
1
Training Roadmap
Choose your path
SANS comprehensive course offerings enable
professionals to deepen their technical skills in
Focus Job Roles
key practice areas. The courses also address other
topics and audiences, such as security training for
software developers, industrial control engineers, You are experienced in security, preparing
and non-technical personnel in management, legal, for a specialized job role or focus
and audit. Monitoring & Detection Intrusion Detection, Monitoring Over Time
Scan Packets & Networks
Intrusion
SEC503 Intrusion Detection In-Depth | GCIA
Baseline Skills Detection
Monitoring & SEC511 Continuous Monitoring and Security Operations |
Operations GMON
New to Cyber Security Concepts, Terms, & Skills The detection of what is happening in your environment requires an
increasingly sophisticated set of skills and capabilities. Identifying
Cyber Security
SEC301 Introduction to Cyber Security | GISF security anomalies requires increased depth of understanding to
Fundamentals
deploy detection and monitoring tools and to interpret their output.
You are experienced in technology, but need Penetration Testing Vulnerability Analysis, Ethical Hacking
to learn hands-on, essential security skills Every Pen Tester Should Know
and techniques SEC560 Network Penetration Testing and Ethical Hacking |
Networks
GPEN
Core Techniques Prevent, Defend, Maintain
SEC542 Web App Penetration Testing and Ethical Hacking |
Every Security Professional Should Know Web Apps
GWAPT
Security
SEC401 Security Essentials Bootcamp Style | GSEC The professional who can find weakness is often a different breed
Essentials
than one focused exclusively on building defenses. A basic tenet of red
Hacker SEC504 Hacker Tools, Techniques, Exploits,
Techniques and Incident Handling | GCIH team/blue team deployments is that finding vulnerabilities requires
a different way of thinking, and different tools, but is essential for
All professionals entrusted with hands-on cybersecurity work should defense specialists to improve their defenses.
be trained to possess a common set of capabilities enabling them to
secure systems, practice defense-in-depth, understand how attacks
work, and manage incidents when they occur. To be secure, you should
set a high bar for the baseline set of skills in your security organization.
Incident Response & Threat Hunting Host & Network Forensics
Every Forensics and IR Professional Should Know
FOR500 Windows Forensic Analysis | GCFE
Endpoint
FOR508 Advanced Incident Response, Threat Hunting,
Forensics
and Digital Forensics | GCFA
Network FOR572 Advanced Network Forensics: Threat Hunting,
Forensics Analysis, and Incident Response | GNFA
Whether you’re seeking to maintain a trail of evidence on host or
network systems, or hunting for threats using similar techniques, larger
organizations need specialized professionals who can move beyond
first-response incident handling in order to analyze an attack and
Security Management Managing Technical Security Operations develop an appropriate remediation and recovery plan.
Every Security Manager Should Know
Leadership
MGT512 Security Leadership Essentials for Managers | GSLC
Essentials
Critical SEC566 Implementing and Auditing the Critical Security
Controls Controls – In-Depth | GCCC
With an increasing number of talented technologists, organizations
require effective leaders to manage their teams and processes. Those CISSP®
MGT414 SANS Training Program for CISSP® Certification | GISP
Training
managers will not necessarily perform hands-on work, but they must
know enough about the underlying technologies and frameworks to
help set strategy, develop appropriate policies, interact with skilled
practitioners, and measure outcomes.
Development Paths
Cloud Security SEC545 Cloud Security Architecture and Operations ICS Security
ICS612 ICS Cyber Security In-Depth
In-Depth
Windows/Powershell SEC505 Securing Windows and PowerShell Automation | GCWN
NERC Protection
Linux/ Unix Defense SEC506 Securing Linux/Unix | GCUX
NERC Security ICS456 Essentials for NERC Critical
SIEM SEC555 SIEM with Tactical Analytics | GCDA Essentials Infrastructure Protection | GCIP
Other Advanced Defense Courses
Security Architecture SEC530 Defensible Security Architecture and Engineering | GDSA DevSecOps
SEC599 Defeating Advanced Adversaries – Purple Team Tactics Every Developer Should Know
Adversary Emulation
and Kill Chain Defenses | GDAT
DEV522 Defending Web Applications
Secure Web Apps
Security Essentials | GWEB
Specialized Penetration Testing Focused Techniques & Areas Secure DevOps SEC540 Cloud Security and DevOps Automation | GCSA
In-Depth Coverage
Vulnerability Assessment SEC460 Enterprise Threat and Vulnerability Assessment | GEVA
SEC660 Advanced Penetration Testing, Exploit Writing,
Networks and Ethical Hacking | GXPN
SEC760 Advanced Exploit Development for Penetration Testers
SEC642 Advanced Web App Testing, Ethical Hacking, and
Web Apps COURSE LISTING KEY:
Exploitation Techniques
Mobile SEC575 Mobile Device Security and Ethical Hacking | GMOB Topic Course Code GIAC Certification
Wireless SEC617 Wireless Penetration Testing and Ethical Hacking | GAWN
Python Coding SEC573 Automating Information Security with Python | GPYC Essentials ICS410 ICS/SCADA Security Essentials | GICSP
Course Title
Digital Forensics, Malware Analysis, & Threat Intel Specialized Investigative Skills
Malware Analysis
FOR610 Reverse-Engineering Malware: Malware Analysis
Malware Analysis
Tools and Techniques | GREM
Threat Intelligence
60+
Cyber Threat Intelligence FOR578 Cyber Threat Intelligence | GCTI
Digital Forensics & Media Exploitation
Battlefield Forensics
FOR498 Battlefield Forensics & Data Acquisition
To learn more hands-on
& Data Acquisition about additional courses
Smartphones FOR585 Smartphone Forensic Analysis In-Depth | GASF SANS courses, go to:
Memory Forensics FOR526 Advanced Memory Forensics & Threat Detection sans.org/courses
Mac Forensics FOR518 Mac and iOS Forensic Analysis and Incident Response
4
Fundamentals, Essentials, Advanced
This introductory course is the fastest way to get GCED GIAC Certified Enterprise Defender
up to speed in information security. The entry-level A key theme of this course is that prevention is ideal,
course includes a broad spectrum of security topics but detection is a must. Security professionals must
and real-life examples. know how to constantly advance security efforts
sans.org/SEC301 in order to prevent as many attacks as possible.
This prevention needs to occur both externally
SEC401 Security Essentials Bootcamp Style and internally via portable network and server
environments.
GSEC GIAC Security Essentials
sans.org/SEC501
Learn the language and underlying theory of computer
Additional Courses and Certifications
and information security, helping you understand how
security applies to your job. You’ll walk away having SEC402 Cybersecurity Writing: Hack the Reader
gained the latest knowledge and essential skills MGT414 SANS Training Program for CISSP® Certification
required for effective management of security systems GISP Certification
5
Blue Team Operations
SEC450 Blue Team Fundamentals: Security SEC555 SIEM with Tactical Analytics
Operations and Analysis GCDA GIAC Certified Detection Analyst
This course provides an accelerated on-ramp for SEC555 guides students through the steps of tailoring
new cyber defense team members and SOC managers. and deploying Security Information and Event
The curriculum introduces students to a defender’s Management (SIEM) to full Security Operations Center
common tools and packs in essential explanations of (SOC) integration. The underlying theme is to actively
those tools, processes, and data flow that every blue apply continuous monitoring and analysis techniques
team member needs to know. by utilizing modern cyber threat attacks. Labs involve
sans.org/SEC450
replaying captured attack data to provide real-world
results and visualizations.
SEC511 Continuous Monitoring sans.org/SEC555
and Security Operations
GMON GIAC Continuous Monitoring Certification Additional Courses and Certifications
The Defensible Security Architecture and Network SEC455 SIEM Design & Implementation
Security Monitoring taught in this course will best SEC487 Open-Source Intelligence (OSINT) Gathering and Analysis
position your organization or Security Operations SEC503 Intrusion Detection In-Depth | GCIA Certification
Center (SOC) to analyze threats and detect anomalies SEC505 Securing Windows and PowerShell Automation
GCWN Certification
that could indicate cybercriminal behavior.
SEC506 Securing Linux/Unix | GCUX Certification
sans.org/SEC5111
SEC524 Cloud Security and Risk Fundamentals
SEC530 Defensible Security Architecture SEC545 Cloud Security Architecture and Operations
7
Penetration Testing
“In one week, my instructor built a bridge from typical Penetration Testing
Job Roles:
vulnerability scanning to the true art of penetration • System/Network
testing. Thank you SANS for making myself and my Penetration Tester
8
Assess, Test, Exploit
9
Incident Response, Threat Hunting
and Digital Forensics
Digital Forensics,
IncidentIncident
Response, Threat
“This training is invaluable to a practitioner! Hunting and Digital Forensics
Response, & Threat Hunting
The tools and knowledge that you gain from Job Roles:
Job Roles:
Featured Incident Response, Threat Hunting and Digital Forensics Training and Certifications
In this course, you’ll build in-depth and GNFA GIAC Network Forensic Analyst
comprehensive digital forensics knowledge of This course covers the tools, technology, and
Microsoft Windows operating systems by analyzing processes required to integrate network data sources
and authenticating forensic data, tracking detailed into your investigations, with a focus on efficiency and
user activity, and organizing findings. effectiveness. There are many use cases for network
sans.org/FOR500 data, including proactive threat hunting, reactive
forensic analysis, and continuous incident response.
FOR508 Advanced Incident Response, Learn the techniques that can help close gaps in these
Threat Hunting, and Digital Forensics use cases and dive into the full spectrum of network
GCFA GIAC Certified Forensic Analyst evidence, including high-level NetFlow analysis,
low-level pcap exploration, ancillary network log
This course teaches advanced skills to hunt, identify, examination, and more.
counter, and recover from a wide range of threats sans.org/FOR572
within enterprise networks, including advanced
persistent threat (APT) nation-state adversaries,
organized crime syndicates, and hactivists. You’ll use
threat hunting to catch intrusions while they are in
progress, rather than after attackers have attained
their objectives.
sans.org/FOR508
• DFIR NetWars:
Additional Courses and Certifications Enhance your sans.org/netwars
training with:
FOR498 Battlefield Forensics & Data Acquisition • A SANS Summit –
FOR518 Mac and iOS Forensic Analysis and Incident Response DFIR, Threat Hunting
and Incident Response,
FOR526 Advanced Memory Forensics & Threat Detection
Cyber Threat Intelligence
FOR578 Cyber Threat Intelligence | GCTI Certification sans.org/summit
FOR585 Smartphone Forensic Analysis In-Depth • Webcasts, blogs, research,
GASF Certification and other resources like SIFT
FOR610 Reverse-Engineering Malware: Malware Analysis Workstation and EZ Tools
Tools and Techniques | GREM Certification digital-forensics.sans.org
Review full course descriptions and demos at sans.org/courses • The SANS Technology Institute’s
undergraduate and graduate
cybersecurity programs,
including a Graduate Certificate
in Incident Response
sans.edu
11
Security Management,
Legal, and Audit
MGT512 Security Leadership Essentials for Managers MGT514 Security Strategic Planning,
Policy, and Leadership
GSLC GIAC Security Leadership Certification
GSTRT GIAC Strategic Planning,
In this course, managers are empowered with
Policy, and Leadership Certification
the technical knowledge and management skills
necessary to lead security teams. The entire security This course teaches cybersecurity leaders how to
stack is covered, including data, network, host, build and execute strategic plans that resonate with
application, and user controls in conjunction with other business executives, create effective information
key management topics that address the overall security policy, and develop management skills to
security lifecycle. better lead, inspire, and motivate teams.
sans.org/MGT512 sans.org/MGT514
13
DevSecOps
Develop, Automate, Deploy
14
Industrial Control
Protect Industry and Infrastructure
Systems
• Recognize ICS components, Featured Industrial Control Systems Training and Certifications
purposes, deployments,
significant drivers, and ICS410 ICS/SCADA Security Essentials
constraints GICSP Global Industrial Cyber Security Professional
• Identify ICS assets and their This course is designed to train the workforce involved in supporting
network topologies and how and defending industrial control systems on how to keep the operational
to monitor ICS hotspots for environment safe, secure, and resilient against current and emerging
abnormalities and threats threats.
sans.org/ICS410
• Understand approaches to
system and network defense ICS515 ICS Active Defense and Incident Response
architectures and techniques
GRID GIAC Response and Industrial Defense
• Perform ICS incident response This course will show you how to deconstruct ICS cyber-attacks, leverage
focusing on security operations an active defense to identify and counter threats in your ICS, and
and prioritizing the safety and maintain the safety and reliability of operations. You’ll better understand
reliability of operations your networked ICS environment, how to monitor it for threats and
• Implement effective cyber perform incident response against identified threats, and how you
and physical access controls can learn from interactions to enhance network security.
sans.org/ICS515
The cyber labs were realistic and SEC699 Purple Team Tactics — Adversary Emulation
for Breach Prevention & Detection
hearing from the red team each day
was valuable.” sans.org/purple-team
TBT570 Team-Based Training - Blue Team and Red Cloud Security Training and Certifications
Team Dynamic Workshop
sans.org/TBT This rapidly developing focus area incorporates
hands-on labs and exercises to help cybersecurity
professionals apply their skills within real-world
cloud environments.
Stay at the
Forefront of
Cybersecurity
16
“Very impressed with SANS
NetWars. The material is
relevant and educational,
and the tournament-style
play is remarkably engaging.
I really like the scoring
system and scoreboard.”
— Adam Tice,
Lockheed Center for Cyber Security
Newsletters
NewsBites @RISK: The Consensus Security Alert
Twice-weekly, high-level executive summary of the most A reliable weekly summary of (1) newly
important news relevant to cybersecurity professionals. discovered attack vectors, (2) vulnerabilities
OUCH! with active new exploits, (3) how recent
attacks worked, and (4) other valuable data.
The world’s leading monthly, free security awareness newsletter
designed for the common computer user.
WhatWorks Webcasts
Webcasts The SANS WhatWorks webcasts bring powerful
Ask the Experts Webcasts
customer experiences showing how end users
SANS experts bring current and timely information on relevant resolved specific IT Security issues.
topics in IT Security.
Analyst Webcasts
A follow-on to the SANS Analyst Program, Analyst Webcasts Tool Talks
provide key information from our whitepapers and surveys.
Tool Talks are designed to give you a solid
understanding of a problem and how a vendor’s
commercial tool can be used to solve or mitigate
Other Free Resources that problem.
(No portal account is necessary)
• Security Posters
• InfoSec Reading Room • Thought Leaders
• Top 25 Software Errors • 20 Coolest Careers
• 20 Critical Controls • Security Glossary
• Security Policies • SCORE (Security Consensus Operational
• Intrusion Detection FAQs Readiness Evaluation)
• Tip of the Day
Follow us on our social media channels to stay up-to-date on the latest cyber security
developments and announcements around SANS EMEA events and courses.