SANS Institute: Difference between revisions
ClueBot NG (talk | contribs) m Reverting possible vandalism by 77.86.69.74 to version by ButterCashier. Report False Positive? Thanks, ClueBot NG. (4187052) (Bot) |
m Reverted edits by 2601:2C5:4900:F720:F068:AB30:189D:173F (talk) (HG) (3.4.12) |
||
(32 intermediate revisions by 23 users not shown) | |||
Line 5: | Line 5: | ||
{{primary sources|date=November 2015}} |
{{primary sources|date=November 2015}} |
||
}} |
}} |
||
{{for|the video game character|Sans (Undertale)}} |
|||
{{Infobox organization |
{{Infobox organization |
||
|name = SANS Institute |
|name = SANS Institute |
||
Line 28: | Line 29: | ||
|num_volunteers = |
|num_volunteers = |
||
|budget = |
|budget = |
||
|website = {{URL|sans.org/}} |
|website = {{Plainlist| |
||
* {{URL|sans.org/}} |
|||
* {{URL|sans.edu/}}}} |
|||
|remarks = |
|remarks = |
||
}} |
}} |
||
The '''SANS Institute''' (officially the '''Escal Institute of Advanced Technologies''') is a private [[United States|U.S.]] for-profit company<ref>{{cite web |title=What is the SANS Institute? |url=http://www.sans.org/faq/#faq67 |work=SANS Frequently Asked Questions (faq): Security Training: General |access-date=2012-09-19 }}</ref> founded in 1989 that specializes in [[information security]], [[cybersecurity]] training, and selling certificates. Topics available for training include cyber and network defenses, [[Penetration test|penetration testing]], incident response, [[digital forensics]], and [[Information security audit|auditing]].<ref>{{cite web |title=The SANS Institute Company Profile - Office Locations, Competitors, Revenue, Financials, Employees, Key People, Subsidiaries |url=https://craft.co/sans-institute|publisher=crafit.io}}</ref> The [[information security]] courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs<ref>{{Cite web|url = http://media.scmagazine.com/documents/118/botn2015sm_29485.pdf|title = SC Magazine Awards 2015|website = SC Magazine|access-date = 2015-11-17|archive-date = 2018-08-07|archive-url = https://web.archive.org/web/20180807123108/https://media.scmagazine.com/documents/118/botn2015sm_29485.pdf|url-status = dead}}</ref> and certification programs.<ref>{{Cite web|title = 2014 SC Awards U.S. Winners|url = http://www.scmagazine.com/2014-sc-awards-us-winners/article/334892/4/|website = SC Magazine|access-date = 2015-11-17}}</ref> Per 2021, SANS is the world’s largest cybersecurity research and training organization.<ref>{{Cite news |last=Perlroth |first=Nicole |date=2021-11-15 |title=Alan Paller, a Mover on Cybersecurity Threat, Is Dead at 76 |work=The New York Times |url=https://www.nytimes.com/2021/11/15/technology/alan-paller-dead.html |access-date=2022-03-19}}</ref> SANS is an acronym for SysAdmin, Audit, Network, and Security.<ref>{{Cite web|url=https://www.pcmag.com/encyclopedia/term/50799/sans|title=SANS Definition from PC Magazine Encyclopedia|website=www.pcmag.com|access-date=2016-09-14}}</ref> |
|||
The '''SANS Institute''' (officially the '''Escal Institute of Advanced Technologies''') is a private [[United States|U.S.]] for-profit company<ref>{{cite web |title=What is the SANS Institute? |url=http://www.sans.org/faq/#faq67 |work=SANS Frequently Asked Questions (faq): Security Training: General |access-date=2012-09-19 }}</ref> founded in 1989 that specializes in [[information security]], [[cybersecurity]] training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, [[digital forensics]], and auditing.<ref>{{cite web |title=The SANS Institute Company Profile - Office Locations, Competitors, Revenue, Financials, Employees, Key People, Subsidiaries |url=https://craft.co/sans-institute|publisher=crafit.io}}</ref> The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs<ref>{{Cite web|url = http://media.scmagazine.com/documents/118/botn2015sm_29485.pdf|title = SC Magazine Awards 2015|website = SC Magazine}}</ref> and certification programs.<ref>{{Cite web|title = 2014 SC Awards U.S. Winners|url = http://www.scmagazine.com/2014-sc-awards-us-winners/article/334892/4/|website = SC Magazine|access-date = 2015-11-17}}</ref> Per 2021, SANS is the world’s largest cybersecurity research and training organization.<ref>{{Cite news |last=Perlroth |first=Nicole |date=2021-11-15 |title=Alan Paller, a Mover on Cybersecurity Threat, Is Dead at 76 |work=The New York Times |url=https://www.nytimes.com/2021/11/15/technology/alan-paller-dead.html |access-date=2022-03-19}}</ref> SANS stands for SysAdmin, Audit, Network, and Security.<ref>{{Cite web|url=https://www.pcmag.com/encyclopedia/term/50799/sans|title=SANS Definition from PC Magazine Encyclopedia|website=www.pcmag.com|access-date=2016-09-14}}</ref> |
|||
==Programs== |
==Programs== |
||
Line 40: | Line 42: | ||
==Training== |
==Training== |
||
When originally organized in 1989,<ref>{{cite web|url=http://www.sans.org/about/sans.php|title=SANS Institute: About|work=sans.org}}</ref> SANS training events functioned like traditional technical conferences showcasing technical presentations. By the mid-1990s, SANS offered [[Convention (meeting)|event]]s which combined training with [[trade fair|tradeshow]]s. Beginning in 2006, SANS offered asynchronous online training (SANS OnDemand) and a virtual, synchronous classroom format (SANS vLive). Free webcasts and email newsletters (@Risk, Newsbites, Ouch!) have been developed in conjunction with security vendors. The actual content behind SANS training courses and training events |
When originally organized in 1989,<ref>{{cite web|url=http://www.sans.org/about/sans.php|title=SANS Institute: About|work=sans.org|access-date=2008-12-16|archive-date=2013-04-12|archive-url=https://web.archive.org/web/20130412014412/http://www.sans.org/about/sans.php|url-status=dead}}</ref> SANS training events functioned like traditional technical conferences showcasing technical presentations. By the mid-1990s, SANS offered [[Convention (meeting)|event]]s which combined training with [[trade fair|tradeshow]]s. Beginning in 2006, SANS offered asynchronous online training (SANS OnDemand) and a virtual, synchronous classroom format (SANS vLive). Free webcasts and email newsletters (@Risk, Newsbites, Ouch!) have been developed in conjunction with security vendors. The actual content behind SANS training courses and training events remains "vendor-agnostic". Vendors cannot pay to offer their own official SANS course, although they can teach a SANS "hosted" event via sponsorship. |
||
In 1999, the SANS Institute formed [[Global Information Assurance Certification]] (GIAC), an independent entity that grants certifications in information security topics.<ref>{{cite web|url=http://www.giac.org/|title=GIAC Information Security Certifications – Cyber Certifications|work=giac.org}}</ref> |
In 1999, the SANS Institute formed [[Global Information Assurance Certification]] (GIAC), an independent entity that grants certifications in information security topics.<ref>{{cite web|url=http://www.giac.org/|title=GIAC Information Security Certifications – Cyber Certifications|work=giac.org}}</ref> |
||
It has developed and operates ''NetWars'', a suite of interactive learning tools for simulating scenarios such as cyberattacks. NetWars is in use by the US Air Force<ref>{{Cite |
It has developed and operates ''NetWars'', a suite of interactive learning tools for simulating scenarios such as cyberattacks. NetWars is in use by the US Air Force<ref>{{Cite news|title = Stepped Up Cyberthreats Prompt Air Force To Rethink Training, Acquisitions|url = http://www.afcea.org/content/?q=stepped-cyberthreats-prompt-air-force-rethink-training-acquisitions|newspaper = Afcea International|access-date = 2015-11-17}}</ref> and the US Army.<ref>{{Cite web|title = Strengthening the nation's defense against hackers|url = http://www.cbsnews.com/news/strengthening-the-nations-defense-against-hackers/2/|website = www.cbsnews.com| date=26 April 2015 |access-date = 2015-11-17}}</ref><ref>{{Cite news|title = CyberCity allows government hackers to train for attacks|url = https://www.washingtonpost.com/investigations/cybercity-allows-government-hackers-to-train-for-attacks/2012/11/26/588f4dae-1244-11e2-be82-c3411b7680a9_story.html|newspaper = The Washington Post|date = 2012-11-26|access-date = 2015-11-17|issn = 0190-8286|language = en-US|first = Robert Jr|last = O'Harrow}}</ref> |
||
==Faculty== |
==Faculty== |
||
The majority of SANS faculty are not SANS employees, but industry professionals and experts in the field of information security.<ref name="InstructorExpertise">{{cite web |url=https://cybersecurityminute.com/press-release/media-alert-cyber-security-expert-sans-instructor-robert-m-lee-host-webcast-analyzing-enhanced-analysis-grizzly-steppe-report/ |title=Instructor Expertise|author=Cyber Security Minute}}</ref><ref>{{cite web |url=http://www.packetstan.com/2011/08/what-i-learned-at-camp.html |title=What I Learned At Camp|author=PacketStan}}</ref> The faculty is organized into six different levels: Mentors, Community, Certified Instructors, Principal Instructors, Senior Instructors, and Fellows.<ref name="SANSFaculty">{{cite web |url=http://www.sans.org/instructors/ |title=Instructors|author=SANS Technology Institute}}</ref> |
The majority of SANS faculty are not SANS employees, but industry professionals and experts in the field of information security.<ref name="InstructorExpertise">{{cite web |url=https://cybersecurityminute.com/press-release/media-alert-cyber-security-expert-sans-instructor-robert-m-lee-host-webcast-analyzing-enhanced-analysis-grizzly-steppe-report/ |title=Instructor Expertise|author=Cyber Security Minute|date=15 February 2017 }}</ref><ref>{{cite web |url=http://www.packetstan.com/2011/08/what-i-learned-at-camp.html |title=What I Learned At Camp|author=PacketStan}}</ref> The faculty is organized into six different levels: Mentors, Community, Certified Instructors, Principal Instructors, Senior Instructors, and Fellows.<ref name="SANSFaculty">{{cite web |url=http://www.sans.org/instructors/ |title=Instructors|author=SANS Technology Institute}}</ref> |
||
==SANS Technology Institute== |
==SANS Technology Institute== |
||
{{As of | 2006}} SANS established the SANS Technology Institute, an accredited college based on SANS training and GIAC certifications. On November 21, 2013, SANS Technology Institute was granted [[regional accreditation]] by the [[Middle States Commission on Higher Education]].<ref>{{Cite web |title=SANS Technology Institute, The - Statement of Accreditation Status |url=https://www.msche.org/institution/9185/ |access-date=2022-03-19 |website=Middle States Commission on Higher Education}}</ref> |
{{As of | 2006}}, SANS established the SANS Technology Institute, an accredited college based on SANS training and GIAC certifications. On November 21, 2013, SANS Technology Institute was granted [[regional accreditation]] by the [[Middle States Commission on Higher Education]].<ref>{{Cite web |title=SANS Technology Institute, The - Statement of Accreditation Status |url=https://www.msche.org/institution/9185/ |access-date=2022-03-19 |website=Middle States Commission on Higher Education}}</ref> |
||
SANS Technology Institute focuses exclusively on cybersecurity, offering a [[Master of Science]] degree program in Information Security Engineering (MSISE), five post-baccalaureate certificate programs (Penetration Testing & Ethical Hacking, Incident Response, Industrial Control Systems, Cyber Defense Operations, and Cybersecurity Engineering (Core), and an upper-division undergraduate certificate program (Applied Cybersecurity). SANS later launched a bachelor's degree program in Applied Cybersecurity as well.<ref>{{cite web|title=College Navigator-SANS Technology Institute, National Center for Education Statistics|url=https://nces.ed.gov/collegenavigator/?id=493895#general}}</ref> |
|||
SANS continues to offer free security content via the SANS Technology Institute Leadership Lab<ref>{{cite web|url=http://www.sans.edu/resources/securitylab|title=STI Information Security Laboratory|work=sans.edu|access-date=2007-07-14|archive-date=2010-12-20|archive-url=https://web.archive.org/web/20101220153435/http://www.sans.edu/resources/securitylab/|url-status=dead}}</ref> and IT/Security related leadership information.<ref>{{cite web|url=http://www.sans.edu/resources/leadershiplab|title=STI Information Security Leadership Laboratory|work=sans.edu|access-date=2007-05-10|archive-date=2010-12-16|archive-url=https://web.archive.org/web/20101216205851/http://www.sans.edu/resources/leadershiplab/|url-status=dead}}</ref> |
|||
== Courses & Certifications == |
|||
SANS offers more than 85 hands-on [[cyber security]] courses and [[certification]] programs.<ref>{{Cite web |title=Cybersecurity Courses & Certifications |url=https://www.sans.org/cyber-security-courses/ |access-date=2024-01-05 |website=sans}}</ref> |
|||
*SEC504: Hacker Tools, Techniques, and Incident Handling |
|||
*SEC401: Security Essentials - Network, Endpoint, and Cloud |
|||
*FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics |
|||
*SEC275: Foundations: Computers, Technology, & Security |
|||
*SEC560: Enterprise Penetration Testing |
|||
*FOR578: Cyber Threat Intelligence |
|||
*SEC301: Introduction to Cyber Security |
|||
*LDR512: Security Leadership Essentials for Managers |
|||
*SEC488: Cloud Security Essentials |
|||
*FOR500: Windows Forensic Analysis |
|||
*ICS410: ICS/SCADA Security Essentials |
|||
*FOR509: Enterprise Cloud Forensics and Incident Response |
|||
*LDR514: Security Strategic Planning, Policy, and Leadership |
|||
*SEC530: Defensible Security Architecture and Engineering: Implementing Zero Trust for the Hybrid Enterprise |
|||
*FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques |
|||
*SEC503: Network Monitoring and Threat Detection In-Depth |
|||
*SEC542: Web App Penetration Testing and Ethical Hacking |
|||
*SEC540: Cloud Security and DevSecOps Automation |
|||
*SEC588: Cloud Penetration Testing |
|||
*SEC497: Practical Open-Source Intelligence (OSINT) |
|||
*SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking |
|||
*LDR414: SANS Training Program for the CISSP Certification |
|||
*SEC510: Public Cloud Security: AWS, Azure, and GCP |
|||
*ICS515: ICS Visibility, Detection, and Response |
|||
*SEC450: Blue Team Fundamentals: Security Operations and Analysis |
|||
*SEC573: Automating Information Security with Python |
|||
*SEC566: Implementing and Auditing CIS Controls |
|||
*SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses |
|||
*FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response |
|||
*LDR551: Building and Leading Security Operations Centers |
|||
*SEC511: Continuous Monitoring and Security Operations |
|||
*SEC555: SIEM with Tactical Analytics |
|||
*SEC541: Cloud Security Attacker Techniques, Monitoring, and Threat Detection |
|||
*SEC522: Application Security: Securing Web Apps, APIs, and Microservices |
|||
*FOR585: Smartphone Forensic Analysis In-Depth |
|||
*SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals |
|||
*SEC501: Advanced Security Essentials - Enterprise Defender |
|||
*FOR608: Enterprise-Class Incident Response & Threat Hunting |
|||
*SEC565: Red Team Operations and Adversary Emulation |
|||
*SEC587: Advanced Open-Source Intelligence (OSINT) Gathering and Analysis |
|||
*SEC575: iOS and Android Application Security Analysis and Penetration Testing |
|||
*LDR516: Building and Leading Vulnerability Management Programs |
|||
*SEC505: Securing Windows and PowerShell Automation |
|||
*LDR521: Security Culture for Leaders |
|||
*FOR518: Mac and iOS Forensic Analysis and Incident Response |
|||
*FOR710: Reverse-Engineering Malware: Advanced Code Analysis |
|||
*SEC617: Wireless Penetration Testing and Ethical Hacking |
|||
*LDR525: Managing Cybersecurity Initiatives & Effective Communication |
|||
*FOR498: Digital Acquisition and Rapid Triage |
|||
*AUD507: Auditing Systems, Applications, and the Cloud |
|||
*SEC760: Advanced Exploit Development for Penetration Testers |
|||
*SEC556: IoT Penetration Testing |
|||
*FOR528: Ransomware and Cyber Extortion |
|||
*ICS612: ICS Cybersecurity In-Depth |
|||
*SEC699: Advanced Purple Teaming - Adversary Emulation & Detection Engineering |
|||
*ICS456: Essentials for NERC Critical Infrastructure Protection |
|||
*SEC549: Enterprise Cloud Security Architecture |
|||
*ICS418: ICS Security Essentials for Managers |
|||
*SEC388: Introduction to Cloud Computing and Security |
|||
*SEC554: Blockchain and Smart Contract Security |
|||
*SEC586: Security Automation with PowerShell |
|||
*SEC467: Social Engineering for Security Professionals |
|||
*SEC402: Cybersecurity Writing: Hack the Reader |
|||
*SEC580: Metasploit for Enterprise Penetration Testing |
|||
*SEC673: Advanced Information Security Automation with Python |
|||
*SEC670: Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control |
|||
*SEC403: Secrets to Successful Cybersecurity Presentation |
|||
*SEC405: Business Finance Essentials |
|||
*SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling - Japanese |
|||
*SEC401J: Security Essentials - Network, Endpoint & Cloud - Japanese |
|||
*AIS247: AI Security Essentials for Business Leaders |
|||
*FOR577: LINUX Incident Response and Threat Hunting |
|||
*FOR589: Cybercrime Intelligence |
|||
*ICS613: ICS Penetration Testing and Assessments |
|||
*LDR419: Performing A Cybersecurity Risk Assessment |
|||
*LDR433: Managing Human Risk |
|||
*LDR520: Cloud Security for Leaders |
|||
*LDR553: Cyber Incident Management |
|||
*SEC406: Linux Security for InfoSec Professionals |
|||
*SEC547: Defending Product Supply Chains |
|||
*SEC568: Combating Supply Chain Attacks with Product Security Testing |
|||
*SEC598: Security Automation for Offense, Defense, and Cloud |
|||
==Awards Programs== |
|||
SANS Technology Institute focuses exclusively on cybersecurity, offering a [[Master of Science]] degree program in Information Security Engineering (MSISE), five post-baccalaureate certificate programs (Penetration Testing & Ethical Hacking, Incident Response, Industrial Control Systems, Cyber Defense Operations, and Cybersecurity Engineering (Core), and an upper-division undergraduate certificate program (Applied Cybersecurity). |
|||
SANS acknowledges the contributions made by exceptional information security professionals, through its annual awards programs.<ref>{{Cite web |title=Cybersecurity Awards {{!}} SANS Institute |url=https://www.sans.org/about/awards/ |access-date=2024-02-08 |website=www.sans.org}}</ref> |
|||
*Difference Makers Awards (DMA) celebrates individuals or teams whose efforts and contributions have resulted in significant advancements in cybersecurity defense capabilities and who are contributing back to the information security community in ways that deserve recognition.<ref>{{Cite press release |last=Institute |first=SANS |title=SANS Announces the 2021 Winners of the Difference Makers Awards |url=https://www.prnewswire.com/news-releases/sans-announces-the-2021-winners-of-the-difference-makers-awards-301441165.html |access-date=2024-02-11 |website=www.prnewswire.com |language=en}}</ref><ref>{{Cite web |date=2020-10-01 |title=Nominations Now Open for the SANS 2020 Difference Makers Awards |url=https://apnews.com/article/technology-computer-and-data-security-computing-and-information-technology-fca61e84994fb8a3850bca45600fcdc8 |access-date=2024-02-11 |website=AP News |language=en-US}}</ref> |
|||
*Michael J. Assante ICS Security Lifetime Achievement Award acknowledges individuals who have made exceptional contributions to the security of Industrial Control Systems (ICS) on a global scale. Recipients are celebrated for their efforts to bridge the gap between IT and operational technology (OT), significantly enhancing awareness and implementations of cyber-secure ICS.<ref>{{Cite press release |last=JupiterOne |title=JupiterOne CISO and Head of Research Wins SANS Lifetime Achievement Award |url=https://www.prnewswire.com/news-releases/jupiterone-ciso-and-head-of-research-wins-sans-lifetime-achievement-award-301704675.html |access-date=2024-02-11 |website=www.prnewswire.com |language=en}}</ref><ref>{{Cite web |title=Edwards is awarded SANS ICS Lifetime Achievement Award - ISA |url=https://www.isa.org/news-press-releases/2019/march/isa-director-marty-edwards-awarded-sans-award |access-date=2024-02-11 |website=isa.org |language=en}}</ref> |
|||
SANS continues to offer free security content via the SANS Technology Institute Leadership Lab<ref>{{cite web|url=http://www.sans.edu/resources/securitylab|title=STI Information Security Laboratory|work=sans.edu}}</ref> and IT/Security related leadership information.<ref>{{cite web|url=http://www.sans.edu/resources/leadershiplab|title=STI Information Security Leadership Laboratory|work=sans.edu}}</ref> |
|||
==See also== |
==See also== |
||
Line 76: | Line 170: | ||
[[Category:Computer security organizations]] |
[[Category:Computer security organizations]] |
||
[[Category:Companies established in 1989]] |
[[Category:Companies established in 1989]] |
||
[[Category:Information technology qualifications]] |
Latest revision as of 21:58, 10 December 2024
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
Abbreviation | SANS |
---|---|
Formation | 1989 |
Location |
|
Website |
The SANS Institute (officially the Escal Institute of Advanced Technologies) is a private U.S. for-profit company[1] founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing.[2] The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs[3] and certification programs.[4] Per 2021, SANS is the world’s largest cybersecurity research and training organization.[5] SANS is an acronym for SysAdmin, Audit, Network, and Security.[6]
Programs
[edit]The SANS Institute sponsors the Internet Storm Center, an internet monitoring system staffed by a community of security practitioners, and the SANS Reading Room, a research archive of information security policy and research documents. SANS is one of the founding organizations of the Center for Internet Security.
SANS offers news and analysis through Twitter feeds and e-mail newsletters. Additionally, there is a weekly news and vulnerability digest available to subscribers.[7]
Training
[edit]When originally organized in 1989,[8] SANS training events functioned like traditional technical conferences showcasing technical presentations. By the mid-1990s, SANS offered events which combined training with tradeshows. Beginning in 2006, SANS offered asynchronous online training (SANS OnDemand) and a virtual, synchronous classroom format (SANS vLive). Free webcasts and email newsletters (@Risk, Newsbites, Ouch!) have been developed in conjunction with security vendors. The actual content behind SANS training courses and training events remains "vendor-agnostic". Vendors cannot pay to offer their own official SANS course, although they can teach a SANS "hosted" event via sponsorship.
In 1999, the SANS Institute formed Global Information Assurance Certification (GIAC), an independent entity that grants certifications in information security topics.[9]
It has developed and operates NetWars, a suite of interactive learning tools for simulating scenarios such as cyberattacks. NetWars is in use by the US Air Force[10] and the US Army.[11][12]
Faculty
[edit]The majority of SANS faculty are not SANS employees, but industry professionals and experts in the field of information security.[13][14] The faculty is organized into six different levels: Mentors, Community, Certified Instructors, Principal Instructors, Senior Instructors, and Fellows.[15]
SANS Technology Institute
[edit]As of 2006[update], SANS established the SANS Technology Institute, an accredited college based on SANS training and GIAC certifications. On November 21, 2013, SANS Technology Institute was granted regional accreditation by the Middle States Commission on Higher Education.[16]
SANS Technology Institute focuses exclusively on cybersecurity, offering a Master of Science degree program in Information Security Engineering (MSISE), five post-baccalaureate certificate programs (Penetration Testing & Ethical Hacking, Incident Response, Industrial Control Systems, Cyber Defense Operations, and Cybersecurity Engineering (Core), and an upper-division undergraduate certificate program (Applied Cybersecurity). SANS later launched a bachelor's degree program in Applied Cybersecurity as well.[17]
SANS continues to offer free security content via the SANS Technology Institute Leadership Lab[18] and IT/Security related leadership information.[19]
Courses & Certifications
[edit]SANS offers more than 85 hands-on cyber security courses and certification programs.[20]
- SEC504: Hacker Tools, Techniques, and Incident Handling
- SEC401: Security Essentials - Network, Endpoint, and Cloud
- FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
- SEC275: Foundations: Computers, Technology, & Security
- SEC560: Enterprise Penetration Testing
- FOR578: Cyber Threat Intelligence
- SEC301: Introduction to Cyber Security
- LDR512: Security Leadership Essentials for Managers
- SEC488: Cloud Security Essentials
- FOR500: Windows Forensic Analysis
- ICS410: ICS/SCADA Security Essentials
- FOR509: Enterprise Cloud Forensics and Incident Response
- LDR514: Security Strategic Planning, Policy, and Leadership
- SEC530: Defensible Security Architecture and Engineering: Implementing Zero Trust for the Hybrid Enterprise
- FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
- SEC503: Network Monitoring and Threat Detection In-Depth
- SEC542: Web App Penetration Testing and Ethical Hacking
- SEC540: Cloud Security and DevSecOps Automation
- SEC588: Cloud Penetration Testing
- SEC497: Practical Open-Source Intelligence (OSINT)
- SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
- LDR414: SANS Training Program for the CISSP Certification
- SEC510: Public Cloud Security: AWS, Azure, and GCP
- ICS515: ICS Visibility, Detection, and Response
- SEC450: Blue Team Fundamentals: Security Operations and Analysis
- SEC573: Automating Information Security with Python
- SEC566: Implementing and Auditing CIS Controls
- SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses
- FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
- LDR551: Building and Leading Security Operations Centers
- SEC511: Continuous Monitoring and Security Operations
- SEC555: SIEM with Tactical Analytics
- SEC541: Cloud Security Attacker Techniques, Monitoring, and Threat Detection
- SEC522: Application Security: Securing Web Apps, APIs, and Microservices
- FOR585: Smartphone Forensic Analysis In-Depth
- SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals
- SEC501: Advanced Security Essentials - Enterprise Defender
- FOR608: Enterprise-Class Incident Response & Threat Hunting
- SEC565: Red Team Operations and Adversary Emulation
- SEC587: Advanced Open-Source Intelligence (OSINT) Gathering and Analysis
- SEC575: iOS and Android Application Security Analysis and Penetration Testing
- LDR516: Building and Leading Vulnerability Management Programs
- SEC505: Securing Windows and PowerShell Automation
- LDR521: Security Culture for Leaders
- FOR518: Mac and iOS Forensic Analysis and Incident Response
- FOR710: Reverse-Engineering Malware: Advanced Code Analysis
- SEC617: Wireless Penetration Testing and Ethical Hacking
- LDR525: Managing Cybersecurity Initiatives & Effective Communication
- FOR498: Digital Acquisition and Rapid Triage
- AUD507: Auditing Systems, Applications, and the Cloud
- SEC760: Advanced Exploit Development for Penetration Testers
- SEC556: IoT Penetration Testing
- FOR528: Ransomware and Cyber Extortion
- ICS612: ICS Cybersecurity In-Depth
- SEC699: Advanced Purple Teaming - Adversary Emulation & Detection Engineering
- ICS456: Essentials for NERC Critical Infrastructure Protection
- SEC549: Enterprise Cloud Security Architecture
- ICS418: ICS Security Essentials for Managers
- SEC388: Introduction to Cloud Computing and Security
- SEC554: Blockchain and Smart Contract Security
- SEC586: Security Automation with PowerShell
- SEC467: Social Engineering for Security Professionals
- SEC402: Cybersecurity Writing: Hack the Reader
- SEC580: Metasploit for Enterprise Penetration Testing
- SEC673: Advanced Information Security Automation with Python
- SEC670: Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
- SEC403: Secrets to Successful Cybersecurity Presentation
- SEC405: Business Finance Essentials
- SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling - Japanese
- SEC401J: Security Essentials - Network, Endpoint & Cloud - Japanese
- AIS247: AI Security Essentials for Business Leaders
- FOR577: LINUX Incident Response and Threat Hunting
- FOR589: Cybercrime Intelligence
- ICS613: ICS Penetration Testing and Assessments
- LDR419: Performing A Cybersecurity Risk Assessment
- LDR433: Managing Human Risk
- LDR520: Cloud Security for Leaders
- LDR553: Cyber Incident Management
- SEC406: Linux Security for InfoSec Professionals
- SEC547: Defending Product Supply Chains
- SEC568: Combating Supply Chain Attacks with Product Security Testing
- SEC598: Security Automation for Offense, Defense, and Cloud
Awards Programs
[edit]SANS acknowledges the contributions made by exceptional information security professionals, through its annual awards programs.[21]
- Difference Makers Awards (DMA) celebrates individuals or teams whose efforts and contributions have resulted in significant advancements in cybersecurity defense capabilities and who are contributing back to the information security community in ways that deserve recognition.[22][23]
- Michael J. Assante ICS Security Lifetime Achievement Award acknowledges individuals who have made exceptional contributions to the security of Industrial Control Systems (ICS) on a global scale. Recipients are celebrated for their efforts to bridge the gap between IT and operational technology (OT), significantly enhancing awareness and implementations of cyber-secure ICS.[24][25]
See also
[edit]References
[edit]- ^ "What is the SANS Institute?". SANS Frequently Asked Questions (faq): Security Training: General. Retrieved 2012-09-19.
- ^ "The SANS Institute Company Profile - Office Locations, Competitors, Revenue, Financials, Employees, Key People, Subsidiaries". crafit.io.
- ^ "SC Magazine Awards 2015" (PDF). SC Magazine. Archived from the original (PDF) on 2018-08-07. Retrieved 2015-11-17.
- ^ "2014 SC Awards U.S. Winners". SC Magazine. Retrieved 2015-11-17.
- ^ Perlroth, Nicole (2021-11-15). "Alan Paller, a Mover on Cybersecurity Threat, Is Dead at 76". The New York Times. Retrieved 2022-03-19.
- ^ "SANS Definition from PC Magazine Encyclopedia". www.pcmag.com. Retrieved 2016-09-14.
- ^ Messier, Ric (2014). GSEC: GIAC Security Essentials Certification. New York: McGraw-Hill Education. p. 7. ISBN 978-0-07-181962-6.
- ^ "SANS Institute: About". sans.org. Archived from the original on 2013-04-12. Retrieved 2008-12-16.
- ^ "GIAC Information Security Certifications – Cyber Certifications". giac.org.
- ^ "Stepped Up Cyberthreats Prompt Air Force To Rethink Training, Acquisitions". Afcea International. Retrieved 2015-11-17.
- ^ "Strengthening the nation's defense against hackers". www.cbsnews.com. 26 April 2015. Retrieved 2015-11-17.
- ^ O'Harrow, Robert Jr (2012-11-26). "CyberCity allows government hackers to train for attacks". The Washington Post. ISSN 0190-8286. Retrieved 2015-11-17.
- ^ Cyber Security Minute (15 February 2017). "Instructor Expertise".
- ^ PacketStan. "What I Learned At Camp".
- ^ SANS Technology Institute. "Instructors".
- ^ "SANS Technology Institute, The - Statement of Accreditation Status". Middle States Commission on Higher Education. Retrieved 2022-03-19.
- ^ "College Navigator-SANS Technology Institute, National Center for Education Statistics".
- ^ "STI Information Security Laboratory". sans.edu. Archived from the original on 2010-12-20. Retrieved 2007-07-14.
- ^ "STI Information Security Leadership Laboratory". sans.edu. Archived from the original on 2010-12-16. Retrieved 2007-05-10.
- ^ "Cybersecurity Courses & Certifications". sans. Retrieved 2024-01-05.
- ^ "Cybersecurity Awards | SANS Institute". www.sans.org. Retrieved 2024-02-08.
- ^ Institute, SANS. "SANS Announces the 2021 Winners of the Difference Makers Awards". www.prnewswire.com (Press release). Retrieved 2024-02-11.
- ^ "Nominations Now Open for the SANS 2020 Difference Makers Awards". AP News. 2020-10-01. Retrieved 2024-02-11.
- ^ JupiterOne. "JupiterOne CISO and Head of Research Wins SANS Lifetime Achievement Award". www.prnewswire.com (Press release). Retrieved 2024-02-11.
- ^ "Edwards is awarded SANS ICS Lifetime Achievement Award - ISA". isa.org. Retrieved 2024-02-11.