SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class from a location near you or virtually from anywhere
Course material is geared for cyber security professionals with hands-on experience
Develop advanced exploit-writing and vulnerability research skills to discover zero-days, analyze patches, and write complex exploits while working with modern security controls and mitigations.
SEC760 is a kind of training we could not get anywhere else. It is not theory, we got to implement and exploit everything we learned.
Master advanced exploit development skills critical for today's threat landscape. In this intensive exploit development course, security professionals pursue modern Windows and Linux vulnerability research, reverse engineering, and sophisticated exploit development. Learn advanced fuzzing techniques, kernel debugging, patch analysis, and exploitation against modern defenses. Through hands-on exercises and real-world targets like the Windows kernel, browsers, and commercial applications, you will build practical experience developing exploits that work against hardened systems.
Jaime Geiger is an experienced forward and reverse engineer with a passion for teaching. He currently works in the DC area, where he perfects software design and implementation, reverse engineering, exploit development, and network administration.
Read more about Jaime GeigerStephen Sims, an esteemed vulnerability researcher and exploit developer, has significantly advanced cybersecurity by authoring SANS's most advanced courses and co-authoring the "Gray Hat Hacking" series.
Read more about Stephen SimsExplore the course syllabus below to view the full range of topics covered in SEC760: Advanced Exploit Development for Penetration Testers.
This section begins working with IDA Pro to look the latest features and techniques. We look at IDA scripting to aid in your reverse engineering workflow and how to leverage AI to assist. Additionally, we cover debugging with IDA, how to create FLIRT signatures, and optimizing your build environment.
This section builds upon fundamental vulnerability knowledge to address modern attack methodologies. Participants learn to navigate and exploit heap structures, utilize format string vulnerabilities, and develop advanced exploitation strategies. Students are introduced to V8, JavaScript essentials, and exploiting a type-confusion vulnerability.
Participants build on basic concepts as they explore sophisticated fuzzing methodologies for vulnerability discovery, learning to implement coverage-guided fuzzing, develop custom harnesses, and utilize advanced tools like WinAFL for closed-source application testing.
This section covers binary diffing techniques and patch analysis methodologies. You will reverse notable Microsoft patches from the past as well as patches from 2025. Microsoft often changes the way in which patches are packaged up. We will look at various ways to optimize the patch extraction and examination process.
This section teaches Windows 10 kernel debugging and exploitation techniques. Participants learn to navigate kernel complexities, analyze Ring 0 vulnerabilities, and develop working exploits while dealing with modern protection mechanisms.
tbd
In this role, you will work to find 0-days (unknown vulnerabilities) in a wide range of applications and devices used by organizations and consumers. Find vulnerabilities before the adversaries!
Explore learning pathIn this role you will be challenged to look at problems and situations from the perspective of an adversary. The focus is on making the Blue Team better by testing and measuring the organization’s detection and response policies, procedures, and technologies. This role includes performing adversary emulation, a type of Red Team exercise where the Red Team emulates how an adversary operates, following the same tactics, techniques, and procedures (TTPs), with a specific objective similar to those of realistic threats or adversaries. It can also include creating custom implants and C2 frameworks to evade detection.
Explore learning pathI've taken many other advanced exploit dev classes and none of them break it down and step through the exploits like this class.
SEC760 is the challenge I was looking for. It will be overwhelming, but well worth it.
The hands-on labs in SEC760 were some of the most intense and educational I've ever experienced. Highly recommend for serious pen testers.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources