SANS London

February 5, 2018 - February 10, 2018

London, United Kingdom

02/05/2018 09:00 02/10/2018 17:00 Cybersecurity Conference: SANS London For more info, please visit: London, United Kingdom

Conference Description (submitted by organizer)

* Choose from 10 hands-on cyber security courses.
* Prepare for: GISF, GSEC, GCIH, GMON, GPEN,GWAPT, GCFE, GCFA, GNFA and GICSP Certifications.
* Take SANS Training in a classroom-like environment and under the supervision of a SANS Instructor.

The following SANS Instructors will be teaching courses at SANS London February 2018:

Bryce Galbraith – Bryce is currently the owner of Layered Security where he provides specialised vulnerability assessment and penetration testing services for clients.

David Hoelzer – David is the author of more than twenty days of SANS courseware. He is an expert in a variety of information security fields, having served in most major roles in the IT and security industries over the past twenty-five years.

Steve Armstrong – Steve began working in the security arena in 1994 whilst serving in the UK Royal Air Force. He founded Logically Secure in 2006 to provide specialist security advice to government departments, defense contractors, the online video gaming industry, and both music and film labels worldwide.

Hassan El Hadary: Hassan is currently a Lead Consultant at SecureMisr heading the application security assessment and code review team. He is also responsible for performing penetration tests as well as advising customers in the areas of PCI-DSS and PCI-PIN Security Compliance Requirements.

Erik Van Buggenhout – Erik is an instructor for the SANS SEC542 “Web Application Penetration Testing & Ethical Hacking” and SANS SEC560 “Network Penetration Testing & Ethical Hacking” courses. Next to his teaching activities for SANS, Erik is the head of technical security services at nViso.

Adrien de Beaupre – Adrien is a member of the SANS Internet Storm Centre and has worked with SANS since 2000. His expert experience includes technical instruction, vulnerability assessment, penetration testing, intrusion detection, incident response and forensic analysis.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.