SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
Course content applicable to people with limited or no cyber security experience
Apply what you learn with hands-on exercises and labs
This course delivers essential training for Security Operations Center (SOC) analysts, equipping you with the skills to detect, stop cyberattacks, and safeguard your organization’s data and systems.
I have been waiting a few months to take this training and it is far exceeding my expectations. For a SOC analyst, SEC450 is a must.
SEC450 is a blue team course ideal for those working in cyber defense operations or building and improving a SOC. It offers six days of training, hands-on labs, and a Capstone competition, covering the mission, mindset, and techniques needed for modern cyber defense. The course, paired with the GIAC GSOC certification, provides essential skills for detecting and halting advanced cyberattacks, making it the gold standard in security operations training.
John redefined modern SOC operations by engineering globally adopted blue team strategies and co-creating the GSOC cert. Through the Blueprint podcast and SANS leadership, he’s unified thousands of defenders around real-world detection tactics.
Read more about John HubbardExplore the course syllabus below to view the full range of topics covered in SEC450: Blue Team Fundamentals: Security Operations and Analysis.
Section one introduces core SOC concepts, focusing on aligning SOC goals with organizational needs and threat landscapes. It covers analyst workflows, key tools like SIEMs and threat intelligence platforms, and how they integrate for effective detection and response. Labs include log analysis, query building, dashboard creation, and incident management.
Day two focuses on building a deep understanding of your network for effective defense. We cover network architecture, visibility points, and traffic capture types, followed by an in-depth look at common services like DNS, HTTP, and TLS. The goal is to help analysts recognize normal data, spot anomalies, and identify attacker tactics using everyday services.
Section three covers common endpoint attacks and security controls, with a focus on key Linux and Windows log events. We also explore file structures, teaching students to identify malicious files and understand file signatures, hashes, and formats.
This section focuses on mastering analysis techniques, avoiding biases, and sorting opportunistic from targeted attacks. It teaches alert triage methods, offensive and defensive mental models, and prioritizing alerts. The day also covers cyber defense OPSEC, phishing email investigation, email header analysis, and safe investigation of attachments and URLs.
This section addresses common SOC challenges like repetitive tasks and burnout by focusing on process optimization, analysis design, and efficiency. It aims to improve team engagement by reducing monotonous tasks and allowing analysts to focus on meaningful work. We cover tool tuning, containment techniques, career development, and community involvement.
The course concludes with a day-long, team-based capture-the-flag competition. Using network data and logs from a simulated network attack, day six offers a full day of hands-on experience applying lessons. Teams will be challenged to detect and identify attacks, progressing through various questions to demonstrate mastery of the concepts and data covered.
Analyze network and endpoint data to swiftly detect threats, conduct forensic investigations, and proactively hunt adversaries across diverse platforms including cloud, mobile, and enterprise systems.
Explore learning pathThis job, which may have varying titles depending on the organization, is often characterized by the breadth of tasks and knowledge required. The all-around defender and Blue Teamer is the person who may be a primary security contact for a small organization, and must deal with engineering and architecture, incident triage and response, security tool administration and more.
Explore learning pathSecurity Operations Center (SOC) managers bridge the gap between business processes and the highly technical work that goes on in the SOC. They direct SOC operations and are responsible for hiring and training, creating and executing cybersecurity strategy, and leading the company’s response to major security threats.
Explore learning pathResponsible for testing, implementing, deploying, maintaining, and administering infrastructure hardware and software for cybersecurity.
Explore learning pathSecurity Operations Center (SOC) analysts work alongside security engineers and SOC managers to implement prevention, detection, monitoring, and active response. Working closely with incident response teams, a SOC analyst will address security issues when detected, quickly and effectively. With an eye for detail and anomalies, these analysts see things most others miss.
Explore learning pathResponsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.
Explore learning pathAs this is one of the highest-paid jobs in the field, the skills required to master the responsibilities involved are advanced. You must be highly competent in threat detection, threat analysis, and threat protection. This is a vital role in preserving the security and integrity of an organization’s data.
Explore learning pathAdd a GIAC certification attempt and receive free two practice tests. View pricing in the info icons below.
When purchasing a live instructor-led class, add an additional 4 months of online access after your course. View pricing in the info icons below.
As a manager of a SOC - this is perfect. We can use all these tools.
So far, SEC450 not only meets but goes beyond my expectations. One year ago I became a SOC team lead and this course adds to my knowledge and puts a more structured approach on what a SOC I am running should look like.
SEC450 was an excellent insight into the tasks of a SOC. Not only did it have actionable lessons on the tools and techniques needed to run a SOC, but also gave insight on ways to improve the operations of the team.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources