SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Train at your own pace from wherever you are
Course material is for individuals with an understanding of IT or cyber security concepts
Apply what you learn with hands-on exercises and labs
Ensure resilience against threats: Fortify applications, secure data, harden infrastructure, comply with GRC programs.
SEC480: AWS Secure Builder equips non-security personnel such as cloud engineers, developers, and architects with the security fundamentals necessary to build secure AWS workloads from the beginning. This course serves as foundational AWS security training, designed to fill the critical knowledge gap for technical professionals responsible for building and deploying workloads to AWS environments. Organizations operating in AWS face a level of complexity that can introduce vulnerabilities, frequently resulting from inadvertent misconfigurations.
Participants engage in eight self-paced modules covering identity management, encryption, access control protocols, and secure coding principles—each paired with practical, real-world labs. The course delivers immediate value by empowering teams to implement protective measures without overburdening security personnel. Upon completion, learners leave with enhanced skills to construct resilient AWS environments.
Serge brings extensive technical expertise as founder/CEO of SpyderSec and President of Denver's OWASP chapter. With over 15 years' frontline experience, Borso delivers practical, implementable AWS security insights valued by global organizations.
Read more about Serge BorsoExplore the course syllabus below to view the full range of topics covered in SEC480: AWS Secure Builder.
In Section 1 of Secure AWS Development, we will concentrate on the shared responsibility model, hardening workloads, securing the CICD pipeline, and understanding the critical role of IAM in AWS.
In Section 2 of Secure AWS Development, we turn our attention to understanding what happens when there are misconfigurations in our environment and how to deal with adversaries. In addition, we will delve into what proper logging and monitoring entail, how to leverage an incident response plan, and strategies to minimize supply chain risks.
Responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.
Explore learning pathResponsible for conducting software and systems engineering and software systems research to develop new capabilities with fully integrated cybersecurity. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Explore learning pathResponsible for planning, implementing, and operating network services and systems, including hardware and virtual environments.
Explore learning pathResponsible for developing and maintaining business, systems, and information processes to support enterprise mission needs. Develops technology rules and requirements that describe baseline and target architectures.
Explore learning pathWith the purchase of this course, you receive the micro-credential exam attempt at no additional charge
With the purchase of this course, you receive the micro-credential exam attempt at no additional charge
Serge is the best instructor I've ever had! He's so knowledgeable and has a great teaching style. Very relatable and helps when people have questions.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources