Live Online Training

Our Live Online Trainings feature 3-6 hours of Faculty-led instruction presented in two-day formats. Available to IANS Decision Support clients with a company seat, these courses have a hands-on, interactive element built into the session designs and are meant to provide you with foundational infosec skills. Included in the client deliverables are technical labs and practical exercises, post-training Faculty hours, and a library of recorded training modules.

*Receive 1 CPE credit for every hour of attendance at our events.
John Strand, IANS Faculty Member
November 5 - 6

2020 Live Online Training
Endpoint Forensics

Web Conference

In this course, participants will conduct basic endpoint forensics on a suspect’s computer. In the lab scenario, we will investigate a potential insider threat case study and students will determine if the suspect truly was an insider threat and perform some basic forensic analysis to uncover the type of threat, intent, etc.

Speakers:
  • Jake Williams

    Jake Williams

    IANS Faculty

    Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

November 9 - 10

2020 Live Online Training
Open Source Tools & Techniques to Secure your Environment

Web Conference

This course will help participants determine which open source tools and techniques may or may not work in their environments. Participants will examine five tools with broad applications – AppLocker, Sysmon, ELK, Security Onion, and OSQuery.

Speakers:
  • John Strand

    John Strand

    IANS Faculty

    John is the Owner of Black Hills Information Security (BHIS) where he leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration and Pivot testing development. He is also a SANS Institute Senior Instructor. In these roles, John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.

December 7 - 8

2020 Live Online Training
Building Behavior-Based Detections

Web Conference

This course will teach participants how to build and deploy behavioral detections based on identifying unusual patterns of behavior within an organization. It will address how attacks work in the wild, including obfuscation and manipulation and how to best effectively write detections.

Speakers:
  • Dave Kennedy

    Dave Kennedy

    IANS Faculty

    Dave is the Founder and Owner of TrustedSec, an information security consulting firm, and Binary Defense, a Managed Security Service Provider (MSSP) that detects attackers early to prevent large-scale invasions. In addition to creating several widely popular open-source tools, including 'The Social-Engineer Toolkit' (SET), PenTesters Framework (PTF), and Artillery. David has also released security advisories, including zero-days, with a focus on security research.

    Prior to his work in the private sector, Dave served in the United States Marine Corps (USMC), focusing on cyber warfare and forensics analysis activities, including two tours to Iraq. He also served on the board of directors for (ISC)2, which is one of the largest security collectives and offers certifications such as the CISSP.

December 14 - 15

2020 Live Online Training
Malware Behavioral Analysis

Web Conference

In this course, participants will learn the basics of behavioral analysis using tools like ProcMon, Wireshark, and Process Hacker to identify the behaviors of malware. Participants will use these tools to assess whether an unknown file is potential malware.

Speakers:
  • Jake Williams

    Jake Williams

    IANS Faculty

    Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

 
 
 
 

Want to know more? Let us know how we can help you.

Success! Thanks for filling out our form! Loading animation

* Required Fields