2 Days Left to Save $400 on SANS Northern Virginia-Reston 2017

Training Courses

Training Courses

Experience private cyber training courses at your government location. SIC is offering the same SANS computer security training courses that have been developed by industry leaders in numerous fields including network security, software security, forensics, security leadership, audit, and legal.

Security
Course Certification Days
SEC440: Critical Security Controls: Planning, Implementing, and Auditing 2
SEC524: Cloud Security Fundamentals 2
SEC580: Metasploit Kung Fu for Enterprise Pen Testing 2
SEC546: IPv6 Essentials 2
SEC564: Red Team Operations and Threat Emulation 2
SEC567: Social Engineering for Penetration Testers 2
SEC480: Top 4 Mitigation Strategies: Implementing & Auditing 3
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth GCCC 5
SEC301: Intro to Information Security GISF 5
SEC201: Computing & Technology Essentials 5
SEC550: Active Defense, Offensive Countermeasures and Cyber Deception 5
SEC401: Security Essentials Bootcamp Style GSEC 6
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling GCIH 6
SEC560: Network Penetration Testing and Ethical Hacking GPEN 6
SEC542: Web App Penetration Testing and Ethical Hacking GWAPT 6
SEC503: Intrusion Detection In-Depth GCIA 6
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking GXPN 6
SEC505: Securing Windows and PowerShell Automation GCWN 6
SEC579: Virtualization and Private Cloud Security 6
SEC501: Advanced Security Essentials - Enterprise Defender GCED 6
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses GAWN 6
SEC575: Mobile Device Security and Ethical Hacking GMOB 6
SEC506: Securing Linux/Unix GCUX 6
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques 6
SEC511: Continuous Monitoring and Security Operations GMON 6
SEC555: SIEM with Tactical Analytics 6
SEC561: Immersive Hands-on Hacking Techniques 6
SEC562: CyberCity Hands-on Kinetic Cyber Range Exercise 6
SEC573: Automating Information Security with Python GPYC 6
SEC760: Advanced Exploit Development for Penetration Testers 6