SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsA: SEC487 will teach students legitimate and effective ways to find, gather, and analyze this data from the Internet. You'll learn about reliable places to harvest data using manual and automated methods and tools. Once you have the data, we'll show you how to ensure that it is analyzed, sound, and useful to your investigations.
This is a foundational course in open-source intelligence (OSINT) gathering and, as such, will move quickly through many areas of the field. The course will teach you current, real-world skills, techniques, and tools that law enforcement, private investigators, cyber attackers, and defenders use to scour the massive amount of information across the Internet, analyze the results, and pivot on interesting pieces of data to find other areas for investigation. Our goal is to provide the OSINT knowledge base for students to be successful in their fields whether they are cyber defenders, threat intelligence analysts, private investigators, insurance claims investigators, intelligence analysts, law enforcement personnel, or just someone curious about OSINT.
A: While far from complete, we have topics in the class that would be helpful to people that are:
A: This is a 6-day lecture and lab course - View the upcoming course runs
A: YES! I've been pleasantly surprised to find out how many different, non-cyber jobs use OSINT techniques but they don't call it "OSINT". A good example is in recruiting, they may refer to the "boolean searches" they use to find candidates. We may call those "Google Dorks" or advanced search engine queries (and there is a site that has thousands of them at https://www.exploit-db.com/google-hacking-database/). If you look information up on the internet, you kare most likely using OSINT and we can teach you to do it even better!
A: Everyone that has taken the class has remarked that they have learned some new trick, new tool, or new web site that they can immediately use back at work. If you have been doing this for a while, chances are good that you may know of many of the techniques and tools that we use but maybe haven't made the time to try them. In class, we give you that time. Additionally, if you've been OSINTing/recruiting/investigating for a while, lyou will know that everyone goes about the process a little differently. Learning others' techniques and site preferences can broaden your OSINT reach and help you achieve your goals. There is a detailed account of what we learn each day at https://www.sans.org/course/open-source-intelligence-gathering.
A: While I call the United States home, I understand that there are MANY of you that do not. And, as such, your targets, be they computers or people, may not reside in the United States. Our examples, courseware, and labs all have international components to them. Yes, there is a large amount of the courseware that covers data in the United States and how to find it but we also move around the world collecting and analyzing data.
A: SANS Certified Instructor, Micah Hoffman
Micah Hoffman has been working in the information technology field since 1998 supporting federal government, commercial, and internal customers in their searches to discover and quantify information security weaknesses within their organizations. He leverages years of hands-on, real-world OSINT, penetration testing, and incident response experience to provide excellent solutions to his customers. Micah is the author of SEC487: Open-Source Intelligence Gathering and Analysis, is a SANS Certified Instructor, and holds GIAC's GMON, GAWN, GWAPT, and GPEN certifications as well as the CISSP.
Micah is a highly active member in the cyber security and OSINT communities. When not working, teaching, or learning, Micah can be found hiking on Appalachian Trail or the many park trails in Maryland. Catch him on Twitter @WebBreacher.
Here is a quick test to see if you could benefit from this class.
If you answered "yes" to any of these questions, then SEC487 is for you.
A: SEC487 is currently being offered in BETA in Denver, CO - June 4-9, 2018 This course is being offered at the special beta pricing of $3,105 - Don't miss this great course at a great price!