IT Security Training

IT Security Training

SANS Secure Europe is getting closer, have you registered? This is your chance to be part of the second biggest Info Sec training event in Europe with seven great technical, in-depth, and hands on classes running over two weeks in the heart of Amsterdam.

This year we will be running:

Week 1
– SEC401: SANS Security Essentials Bootcamp Style with Jim Herbeck
– SEC540: VoIP Security with Paul Henry
– SEC560: Network Penetration Testing and Ethical Hacking with Stephen Sims
– FOR508: Advanced Computer Forensic Analysis and Incident Response with Jess Garcia

Week 2
– SEC617: Wireless Ethical Hacking, Penetration Testing and Defences with Steve Armstrong
– SEC660: Advanced Penetration Testing, Exploits and Ethical Hacking with Stephen Sims
– FOR558: Network Forensics with Jess Garcia

REMEMBER, this is the only time that SEC540 & SEC617 will be running in Europe this year so don't miss this opportunity.

PLUS, this will be the first time that SEC660 has run in Europe since London 2010 where it sold out. It is currently running in SANS 2011 in Orlando, where it has sold out. Seats for Amsterdam are selling fast, and we are expecting another sell out in Amsterdam. So don't miss your place, register now

If you register and pay before April 13th, you will save EUR 150 off the tuition fee. So don't wait any longer, make sure you have your place booked and save some money at the same time.

SANS Secure Europe will be taking place at the Radisson Blu Amsterdam, right in the centre of this fantastic city, so check our location page,, to see how you can get the best rates available at the event hotel.

Next week on Tuesday, 5th of April, sees the start of our SANS Secure Europe Webcast series with "Evolving VoIP Threats," taught by Paul Henry

– 3:00 p.m. Central European Time.

VoIP is thriving in an otherwise down economy:

1. VoIP implementations are growing driven by cost savings 2. Cost is typically the only consideration in the implementation of VoIP – it is all about saving money 3. Security if considered at all is clearly an afterthought 4. Too many still dismiss VoIP threats as theoretical

VoIP can allow significant costs savings while not sacrificing an organizations security. Recognizing the threats and implementing the compensating and technical controls can make all the difference in a successful VoIP implementation.

Further Webcasts involving the instructors in Amsterdam will take place over the coming weeks; further details will be coming soon.

So make sure you are part of what is going to be a great training experience, and we'll see you in Amsterdam.

2011 sees SANS Secure Europe once again returning to Amsterdam on May 9 for two weeks featuring eight of our top courses — the second biggest SANS information security training event in the EMEA region.
Registration is open now, and if you register and pay before April 13 you will save $250 off the course fees. So, start making your travel plans today. (

SANS Secure Europe Amsterdam is a unique opportunity to experience our world-leading training classes back to back. You can make the most of your training and minimize your travel budget by taking two classes.
With classes across our Security, Forensics, and Audit curriculum this is the perfect chance to ensure that you or your employees are at the cutting edge of InfoSec. Give yourself the best chance to find your perfect job in the fast-moving and highly-competitive field of Information Security.

This year will see the following classes run at SANS Secure Europe –

Week 1 – Beginning May 9

Security 401: SANS Security Essentials Bootcamp Style

Maximize your training time and turbo-charge your career in security by learning the full SANS Security Essentials curriculum needed to qualify for the GSEC certification. In this course you will learn the language and underlying theory of computer security. At the same time you will learn the essential, up-to-the-minute knowledge and skills required for effective performance if you are given the responsibility for securing systems and/or organizations. This course meets both of the key promises SANS makes to our students: (1) You will gain up-to-the-minute knowledge you can put into practice immediately upon returning to work; and, (2) You will be taught by the best security instructors in the industry. As always, great teaching sets SANS courses apart, and SANS ensures this by choosing instructors who have ranked highest in a nine-year competition among potential security faculty.

Security 540: VoIP Security


If your organization utilizes voice communications or is thinking of migrating to VoIP (Voice over IP), you need to master VoIP security best practices and technologies in order to design, deploy, and audit trusted VoIP infrastructures. The best way to secure a VoIP network is to incorporate security in the design right from the beginning. However, even if you have security concerns about an existing VoIP network, this course will teach you all of the tips and tricks to protect your critical VoIP networks. You will learn practical tasks that you can directly apply when you go back to work.

SECURITY 560: Network Penetration Testing and Ethical Hacking

Equipping Security Organizations with Advanced Penetration Testing and Ethical Hacking Know-How

Security vulnerabilities, such as weak configurations, unpatched systems, and botched architectures, continue to plague organizations.
Enterprises need people who can find these flaws in a professional manner to help eradicate them from our infrastructures. Lots of people claim to have penetration testing, ethical hacking, and security assessment skills, but precious few can apply these skills in a methodical regimen of professional testing to help make an organization more secure. This class covers the ingredients for successful network penetration testing to help attendees improve their enterprise's security stance.

Forensics 508: Advanced Computer Forensic Analysis and Incident Response

Data breaches and advanced intrusions are occurring daily. Sensitive data and intellectual property is stolen from systems that are protected by sophisticated network and host based security. A motivated criminal group or nation state can and will always find a way inside enterprise networks. In the commercial and government sectors, hundreds of victims responded to serious intrusions costing millions of dollars and loss of untold terabytes of data. Cyber attacks originating from China dubbed the Advanced Persistent Threat have proved difficult to suppress.
Forensics 508 will help you respond to and investigate these incidents.

Week 2 – Beginning May 16th

Audit 507: Auditing Networks, Perimeters and Systems

One of the most significant obstacles facing many auditors today is how exactly to go about auditing the security of an enterprise. What systems really matter? How should the firewall and routers be configured? What settings should be checked on the various systems under scrutiny? Is there a set of processes that can be put into place to allow an auditor to focus on the business processes rather than the security settings?
All of these questions and more will be answered by the material covered in this course.

Security 617: Wireless Ethical Hacking, Penetration Testing and Defences.


Despite the security concerns many of us share regarding wireless technology, it is here to stay. In fact, not only is wireless here to stay, but it is growing in deployment and utilization with wireless LAN technology and WiFi as well as with other applications, including cordless telephones, smart homes, embedded devices, and more.
Technologies like ZigBee and WiMAX offer new methods of connectivity to devices, while other wireless technology, including WiFi, Bluetooth and DECT, continue their massive growth rate, each introducing their own set of security challenges and attacker opportunities.

Security 660: Advanced Penetration Testing, Exploits and Ethical Hacking

This is the first time this course will be running in the EMEA region since successfully debuting at SANS London 2010.

SANS SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560 Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a real world lab environment to solidify advanced concepts and allow for the immediate application of techniques in the workplace. Each day includes an evening boot camp to allow for additional mastery of the techniques discussed and even more hands-on exercises. A sample of topics covered include weaponizing Python for penetration testers, attacks against network access control (NAC) and VLAN manipulation, network device exploitation, breaking out of Windows RDP sessions, man-in-the-middle attacks against RDP and Kerberos, Linux privilege escalation and exploit-writing, defeating modern OS controls such as ASLR and DEP, Windows exploit-writing, and much more!

Forensics 558: Network Forensics

This is the first time the course will be running in the EMEA region since successfully debuting at SANS London 2010.

Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of other valuable data are surreptitiously transferred across the network. Insider attacks leverage cutting-edge covert tunnelling techniques to export data from highly secured environments. Attackers' fingerprints remain throughout the network, in firewall logs, IDS/IPS, web proxies, traffic captures, and more.

Full course descriptions are available on our website at:

With classes running on two consecutive weeks why not maximize this training opportunity, for example, why not take SEC560: Network Penetration Testing and Ethical Hacking in week 1 and then follow this up with SEC660: Advanced Penetration Testing, Exploits and Ethical Hacking, both of which are being taught by Stephen Sims, of join Jess Garcia following the forensic curriculum by taking FOR508: Advanced Computer Forensic Analysis and Incident Response in week 1 and then
FOR558: Network Forensics in week 2.

In addition to these fantastic courses, we also bring with us six of our top instructors. Teaching at SANS Secure Europe – Amsterdam will be:

SEC401 – Jim Herbeck
SEC540 – Paul Henry
SEC560 & SEC660 – Stephen Sims
FOR508 & FOR558 – Jess Garcia
AUD507 – James Tarala
SEC617 – Steve Armstrong

More details on our instructors can be found here:

Here is what some of our past students say about SANS courses:

AUD507 – "Ever thought that doing an audit was an insurmountable task?
SANS will get you equipped to go!" Morten Schioenning TeliaSonera

SEC401 – "SANS is the only resource for current and accurate continuing education training that equips you to defend your organization." – Scarlet Brooks – UAH

SEC560 – "This is THE course for both junior and senior pen testers." – Jax Gough – NATO

FOR508 – "The amount of knowledge and information provided by SANS transforms me from a beginner to a computer Sherlock Holmes." – Ali Al Amri – Saudi Aramco

SEC617 – "The best training I have had in a long time. Very well targeted, practical and knowledgeable." – Mathieu Cousin – Motorola

SANS Secure Europe will be taking place in the Radisson Blu Amsterdam located in the centre of the wonderful city of Amsterdam.

So register today at SANS Secure Europe is SANS second-biggest conference of the year in the whole EMEA region.
You can be assured that this will be a training experience that you do not want to miss. Register now and we will see you in Amsterdam!