Posts

SANS Cyber Defense Initiative (CDI) 2014

/
SANS Cyber Defense Initiative (CDI) 2014 will once again bring together the nation's cyber defense community on December 10-19 at the Grand Hyatt Washington in DC

SANS Security West 2014 – Emerging Trends in Cybersecurity – is coming up on May 8-17

/
SANS Security West 2014 is a vital event for information security professionals looking to stay on top of industry trends, to acquire certifications, and to learn and immediately apply new cybersecurity skills.

SANS Security East 2014, New Orleans, LA – January 20 – 25

/
SANS Security East 2014 is coming up January 20-25. Start the year off right by choosing from ten outstanding, cutting-edge courses presented by SANS featuring our top-rated instructors in New Orleans. Now is the time to improve your information security skills and let the good times roll!

DoD Cyber Crime Conference 2011

/
SANS is pleased to announce that we've partnered with DoD Cyber Crime Conference 2011 to offer SANS two-day Metasploit Kung Fu for Enterprise Pen Testing course as part of the pre-conference training January 21 - 24, 2011 in Atlanta, GA.

SANS Security East 2011

/
SANS is proud to be back in the historic French Quarter of New Orleans for SANS Security East 2011 on January 20 - 27 with our top instructors, new course offerings, action-packed night sessions, and many exciting special events.

MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam

/
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam will prepare you to pass the CISSP® Certification Exam. This course is an accelerated review course that focuses solely on the ten domains of knowledge as determined by ISC2. Test-taking tips and strategies are also discussed.

Creating a Comprehensive Vulnerability Assessment Program for a Large Company Using QualysGuard

/
ulnerability Assessment, according to wikipedia.org, is the process of identifying and quantifying vulnerabilities in a system. Vulnerability assessment can be used against many different types of systems such as a home security alarm, the protection of a nuclear power plant or a military outpost. Note that vulnerability assessment is different from risk assessments even though they share some of the same commonalities. Vulnerability Assessment concerns itself with the identification of vulnerabilities, the possibilities of reducing those vulnerabilities and improving the capacity to manage future incidents. This paper will focus primarily on vulnerability assessment as it pertains to information technology infrastructure and how utilizing QualysGuard can ease the burden on your technology staff.

The 2010 Computer Security Salary Survey

/
The 2010 Computer Security Salary Survey was launched this morning. Please complete it today or at least this week (takes 5 minutes). A valid survey is probably the most valuable tool security people have to have productive conversations with their employers about their salaries. You get the results if you participate.

SANS WhatWorks in Virtualization and Cloud Computing Summit with Tom Liston, Washington DC, August 19-20

/
As security professionals, we work in an environment that never…