Information Security Management Strategies
 Enterprise Risk Assessment
 Large-scale Penetration Testing
 Intrusion Monitoring & Analysis
 Incident Response & Management
 Forensic Analysis for Investigations and eDiscovery
 GIAC Certified Consultants
Instruction and Staff Development
 Experienced Instruction in Enterprise Systems and Security
 Custom Curriculum Development
 SANS Certified Instructors and Authors jham corp. Your Key to a Secure Enterprise. TM
SANS Northern Virginia 2018, Alexandria, VA, 8/13/18 - 8/18/18
SEC401: Security Essentials Bootcamp Style
Simulcast available!
SANS Chicago 2018, Chicago, IL, 8/20/18 - 8/25/18
MGT414: SANS Training Program for CISSP® Certification
SANS Tokyo Autumn 2018, Tokyo, JP, 9/3/18 - 9/15/18
SEC503: Intrusion Detection In-Depth, 9/3/18 - 9/8/18
SEC511: Continuous Monitoring and Security Operations, 9/10/18 - 9/15/18
SANS October Singapore 2018, Singapore, SIN, 10/15/18 - 10/20/18
SEC503: Intrusion Detection In-Depth
Wild West Hackin’ Fest, Deadwood, SD, 10/25/18 - 10/26/18
A Lock Picking Gun Fight Tournament!, 6-7pm, 10/25/18
Blue Team Presentation (title TBA)
SANS Dallas Fall 2018, Dallas, TX, 11/5/18 - 11/10/18
MGT414: SANS Training Program for CISSP® Certification
SANS San Diego Fall 2018, San Diego, CA, 11/12/18 - 11/17/18
SEC503: Intrusion Detection In-Depth
Simulcast available! 
SANS Cyber Defense Initiative, Washington, DC, 12/13/18 - 12/18/18
SEC511: Continuous Monitoring and Security Operations
SANS Sonoma 2019, Santa Rosa, CA, 1/14/19 - 1/19/19
MGT414: SANS Training Program for CISSP® Certification
SANS Scottsdale 2019, Scottsdale, AZ, 2/18/19 - 2/23/19
SEC503: Intrusion Detection In-Depth
SANS Baltimore Spring 2019, Baltimore, MD, 3/4/19 - 3/9/19
SEC511: Continuous Monitoring and Security Operations
SANS San Francisco Spring ’19, San Francisco, CA, 3/11/19 - 3/16/19
SEC401: Security Essentials Bootcamp Stylehttps://www.sans.org/event/northern-virginia-alexandria-2018https://www.sans.org/event/northern-virginia-alexandria-2018/course/security-essentials-bootcamp-stylehttps://www.sans.org/simulcast/details/sec401-aug-2018-jonathan-hamhttps://www.sans.org/event/chicago-2018https://www.sans.org/event/chicago-2018/course/sans-plus-s-training-program-cissp-certification-examhttps://www.sans.org/event/tokyo-autumn-2018https://www.sans.org/event/tokyo-autumn-2018/course/intrusion-detection-in-depthhttps://www.sans.org/event/tokyo-autumn-2018/course/continuous-monitoring-security-operationshttps://www.sans.org/event/october-singapore-2018https://www.sans.org/event/october-singapore-2018/course/intrusion-detection-in-depthhttps://www.wildwesthackinfest.comhttps://www.wildwesthackinfest.com/special-events/https://wwhf18.sched.com/speaker/jonathan_ham.1y0qko9zhttps://www.sans.org/event/dallas-fall-2018https://www.sans.org/event/dallas-fall-2018/course/sans-plus-s-training-program-cissp-certification-examhttps://www.sans.org/event/san-diego-fall-2018https://www.sans.org/event/san-diego-fall-2018/course/intrusion-detection-in-depthhttps://www.sans.org/simulcast/details/sec503-nov-2018-jonathan-hamhttps://www.sans.org/event/cyber-defense-initiative-2018https://www.sans.org/event/cyber-defense-initiative-2018/course/continuous-monitoring-security-operationshttps://www.sans.org/event/sonoma-2019https://www.sans.org/event/sonoma-2019/course/sans-plus-s-training-program-cissp-certification-examhttps://www.sans.org/event/scottsdale-2019https://www.sans.org/event/scottsdale-2019/course/intrusion-detection-in-depthhttps://www.sans.org/event/baltimore-spring-2019https://www.sans.org/event/baltimore-spring-2019/course/continuous-monitoring-security-operationshttps://www.sans.org/event/san-francisco-spring-2019https://www.sans.org/event/san-francisco-spring-2019/course/security-essentials-bootcamp-styleshapeimage_8_link_0shapeimage_8_link_1shapeimage_8_link_2shapeimage_8_link_3shapeimage_8_link_4shapeimage_8_link_5shapeimage_8_link_6shapeimage_8_link_7shapeimage_8_link_8shapeimage_8_link_9shapeimage_8_link_10shapeimage_8_link_11shapeimage_8_link_12shapeimage_8_link_13shapeimage_8_link_14shapeimage_8_link_15shapeimage_8_link_16shapeimage_8_link_17shapeimage_8_link_18shapeimage_8_link_19shapeimage_8_link_20shapeimage_8_link_21shapeimage_8_link_22shapeimage_8_link_23shapeimage_8_link_24shapeimage_8_link_25shapeimage_8_link_26shapeimage_8_link_27
 
 jham corp.
126 East Broadway, Ste 25
Missoula, MT 59802
406-360-0396
info@jhamcorp.com
twitter: @jhamcorpmailto:info@jhamcorp.com?subject=jhamcorp.com%20web%20referral:https://twitter.com/jhamcorpshapeimage_10_link_0shapeimage_10_link_1
Read a book!









In hardcover and eBook.https://www.amazon.com/Network-Forensics-Tracking-Hackers-Cyberspace/dp/0132564718shapeimage_11_link_0
Watch jham talk!





From WWHF’17 YouTubehttps://www.youtube.com/channel/UCef0TWni8ghLcJphdmDBoxw/videosshapeimage_12_link_0
See an interview!



By ITPro.TV at WWHF’17https://www.youtube.com/watch?v=N1CYdiMpcwkshapeimage_13_link_0
jham and Jake!




Panel: Ethical issues in breach disclosurehttps://www.youtube.com/watch?v=b32dRvDwX9Yshapeimage_14_link_0
Upcoming Public Teaching and Speaking Events: