Just announced! We have arranged to offer a SANS course (http://www.sans.org) for those attending our annual Cyber Defense & Disaster Recovery Conference on March 12, held at the University of Illinois at Springfield. There will be no additional cost to attend the SANS training. Registration for the entire one-day conference is still just $30 and includes a sit-down lunch.
The SANS course will consist of three sessions: a Pre-Session Presentation, Hands-on Session 1 and Hands-on Session 2. Those interested in the SANS part of the conference will need to arrive at the conference an hour early at 7:30 am. This is a new SANS Security Course 564: Catching the Wily Hacker. The SANS course instructor will be Peter Szczepankiewicz, currently a Senior Security Engineer with IBM.
Although the Pre-Session Presentation, entitled The State of the Hack, will only be offered once, the additional two Hands-on sessions will each be offered twice throughout the conference day. We hope that this schedule will allow attendees the benefits of hearing other conference speakers.
Pre-Session Presentation: State of the Hack
-Offered once only, 7:30 - 8:30
-We very strongly encourage everyone interested in the SANS track to attend the Pre-Session Presentation, State of the Hack.
SANS Hands-on Session 1: Windows Command Line Kung Fu
-Offered twice during the conference, once in the morning and once in the afternoon.
-Many people do not realize the power of the Windows command-line and have confined themselves inside the prison of the Windows GUI. But, sometimes, in the face of extremely nasty malware that disables GUI-based tools, security personnel are forced to the command line to analyze an infestation. This session will teach you how to become a Windows command line Kung Fu Master.
SANS Hands-on Session 2: The Not-Normal Lab
-Offered twice during the conference, once in the morning and once in the afternoon.
-We will analyze the traffic capture of an actual attack. Students will learn the difference between normal network traffic and not normal network traffic, and what steps to take when "not normal" (possibly attack) traffic is detected.
NOTE: Each of the Hands-on Sessions stands on its own merit and does not require the attendee to be in the other Hands-on Session, although it is strongly encouraged.