James Arlen leads a hands-on exploration of techniques for protecting the cloud, with extensive labs in Amazon Web Services. The first day focuses on root account security, virtual networking security, IAM, and logging/monitoring; the second day covers leveraging PaaS services, using immutable infrastructure, and automating security controls.
Data analysis and machine learning for cybersecurity
Charles Givre (Booz Allen Hamilton), Jay Jacobs (BitSight Technologies)
Join experts Jay Jacobs and Charles Givre for a hands-on, in-depth exploration of data analysis and machine learning in cybersecurity. In this course, you’ll learn how to explore and analyze data you probably already have and gain valuable exposure to and experience with tools and techniques to prepare, analyze, and visualize the knowledge hiding in your data.
Tools and processes
Whiteboard Hacking aka Hands-on Threat Modeling
Steven Wierckx (Toreon)
Toreon proposes a 2 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops with real live Use Cases are provided by Toreon. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling.