SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
Course material is for individuals with an understanding of IT or cyber security concepts
Apply what you learn with hands-on exercises and labs
Learn how to build a secure cloud foundation for your org while maintaining regulatory compliance. Grasp key security issues such as configuring AWS & Azure environments to protect sensitive data.
I learned a lot, went deeper technically than I expected to, and feel like this was absolutely a great use of my time. The instructors and TAs are top notch and made my experience taking this course a very positive one.
SEC488: Cloud Security Essentials prepares you to tackle real-world cloud security challenges with practical, hands-on training in live AWS and Azure environments. This course equips you to secure cloud accounts, protect sensitive data, implement Identity and Access Management (IAM), and mitigate risks during cloud migrations. With 40 immersive labs and a Capture the Flag event, you'll gain the skills to safeguard your organization's assets, maintain compliance, and build a strong security foundation in the cloud.
Ryan’s extensive experience, including roles as a cybersecurity engineer for major Department of Defense cloud projects and as a lead auditor, underscores his dedication to enhancing the security posture of critical systems.
Read more about Ryan NicholsonExplore the course syllabus below to view the full range of topics covered in SEC488: Cloud Security Essentials.
The first section of this cloud security course focuses on IAM. Students will quickly understand IAM's critical role in protecting cloud accounts.
The second section will cover ways to protect the compute elements in cloud providers' Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) offerings.
The third section will first focus on the protection of data in cloud environments. All too often, we are reading news articles about breaches that, very frequently, come down to a misconfiguration of a cloud service.
Section 4 is where many network security analysts, engineers, and architects will begin salivating as they will do a deep dive into the ins and outs of cloud networking and log generation, collection, and analysis to set themselves up for success to defend their IaaS workloads.
In the fifth section, we'll dive headfirst into compliance frameworks, audit reports, privacy, and eDiscovery to equip you with the information and references to ensure that the right questions are being asked during CSP risk assessments.
This final section of this cloud security training course consists of a multi-hour, CloudWars competition to reinforce the topics covered in books 1-5.
Oversees full lifecycle of information systems from design through evaluation, ensuring alignment with functional and operational goals.
Explore learning pathUsing cloud security solutions to respond to incidents and enable defenses
Explore learning pathResponsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.
Explore learning pathDeveloping cloud security roadmaps, plans and procurement models that define policy and procedure
Explore learning pathResponsible for managing the cybersecurity of a program, organization, system, or enclave.
Explore learning pathResponsible for managing the Communications Security (COMSEC) resources of an organization.
Explore learning pathDeploys, configures, maintains infrastructure software and hardware to support secure and effective IT operations across organizational systems.
Explore learning pathImplements and maintains network services, including hardware and virtual systems, ensuring operational support for infrastructure platforms.
Explore learning pathDesigning the adoption of cloud services and define the tools and strategy for cloud solutions
Explore learning pathDesigns system data models and flow architectures to meet mission or business data requirements using scalable and efficient solutions.
Explore learning pathResponsible for developing and analyzing the integration, testing, operations, and maintenance of systems security. Prepares, performs, and manages the security aspects of implementing and operating a system.
Explore learning pathDesigns secure enterprise systems considering environmental constraints and translates them into enforceable security processes and protocols.
Explore learning pathDevelops business and IT process architectures, creating baseline and target architectures to meet mission or enterprise goals.
Explore learning pathDefines technical system specs including cloud strategy and software integration to meet business or mission-aligned system requirements.
Explore learning pathConducts research in systems/software engineering to develop capabilities and identify vulnerabilities, with security integrated throughout.
Explore learning pathAnalyzes new or existing software applications for security issues and provides actionable insights to improve protection and performance.
Explore learning pathAdd a GIAC certification attempt and receive free two practice tests. View pricing in the info icons below.
When purchasing a live instructor-led class, add an additional 4 months of online access after your course. View pricing in the info icons below.
This course is exactly what I hoped it would be. Teaching me Cloud from an IT Cloud Engineer perspective, but with a Security lens.
Real world practicality of the labs has enabled me to envision how to explore and implement cloud best practices, tests, configurations, and the like which I found to be very valuable.
The labs serve to both break up a fairly intensive academic upskilling, and also to teach you how to apply the knowledge correctly and safely, allowing you to secure your cloud environment with confidence and ease.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources