SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Train from anywhere. Attend a live instructor-led course remotely or train on your time over 4 months.
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Earn the expertise necessary to mitigate supply chain risks through advanced security strategies and hands-on application of industry-leading assessment techniques.
I love the level of detail! I value the examples, potential tools, and guidance provided for enhancing security reviews in this process. This information will be instrumental in boosting the productivity of my team and organization.
The supply chain represents a critical threat vector in today's cybersecurity landscape, with supply chain attacks bypassing traditional perimeter-based controls as organizations unknowingly invite adversaries inside through unvalidated "trusted" technologies. This supply chain risk management training course equips professionals with comprehensive strategies to minimize these risks. The course extensively covers the evolving threat landscape and provides essential defensive skills through 13 custom labs. Students work with industry tools including Dependency Track, CycloneDX, Syft, in-toto, and CSAF VEX standards, while learning to identify and mitigate risks in both hardware and software components. Using a purpose-built Linux environment, the course teaches practical application of supply chain security concepts through real-world scenarios, preparing professionals to implement robust protective measures for their organization's technology acquisitions.
Tony Turner has reshaped critical infrastructure security by advancing SBOM maturity and Cyber-Informed Engineering, while pioneering adversarial AI simulations and digital twin technologies as VP at Frenos.
Read more about Tony TurnerExplore the course syllabus below to view the full range of topics covered in SEC547: Defending Product Supply Chains.
Initially we explore the key concepts of supply chain security and vendor risk assessment methodology. The section establishes a foundation for understanding supply chain attacks through case studies and demonstrates scalable approaches to conducting comprehensive vendor evaluations.
This portion of the course focuses on practical application of software bill of materials (SBOM) management and hardware security verification. Students learn to create, validate, and leverage SBOMs for vulnerability management while developing techniques to identify counterfeit hardware and malicious firmware modifications.
Here we address supply chain attestation mechanisms and incident response procedures. The section teaches verification of supply chain artifacts, coordinated vulnerability management, and effective response to supply chain security incidents across hardware and software vectors.
Responsible for testing, implementing, deploying, maintaining, and administering infrastructure hardware and software for cybersecurity.
Explore learning pathResponsible for investigating, analyzing, and responding to network cybersecurity incidents.
Explore learning pathWhen purchasing a live, instructor-led course, add 4 months of online access. View price in the info icons below.
Add 6 months of hands-on skills practice. Add to your cart when purchasing your course.
I very much enjoyed the labGreat way to learn what's happening in the background of some of our security tools. Also enjoyed the use cases it applied to. Definitely provided good insights into how other organizations might be approaching some of these problem sets.
I loved the course. [It is] full of useful information I plan to include in my internal projects!
"The labs/exercises today were great! I'm able to walk away with some great tools and processes that can be implemented to immediately enhance my team's aspect of the security review.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources