SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class remotely from anywhere
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Enhance advanced defensive strategies against AI-powered attacks by understanding adversarial threat models and implementing robust security controls.
This intensive three-day course equips cybersecurity professionals to defend against AI-powered offensive tools and techniques. Organizations today face unprecedented challenges from automated, scalable, and sophisticated attacks from weaponized AI. Students will grasp the full spectrum of AI-enabled threats and understand how adversaries leverage machine learning, natural language processing, computer vision, and large language models to enhance attack capabilities.
In hands-on labs and real-world scenarios, students learn to identify AI attack signatures, implement defensive countermeasures, and develop comprehensive security architectures resistant to AI-powered threats, emphasizing practical, enterprise-ready defense strategies. By understanding offensive AI from an attacker's perspective, security professionals will be equipped to anticipate threats, build resilient defenses, and protect organizations in an era where AI is rapidly transforming the cybersecurity landscape.
Foster brings 15+ years of cybersecurity experience with expertise in offensive security, penetration testing, and AI security research. As a conference speaker and published author, he combines technical depth with practical defensive strategies.
Read more about Foster NethercottExplore the course syllabus below to view the full range of topics covered in SEC535: Offensive AI - Attack Tools and Techniques.
Discover how threat actors leverage AI to gather intelligence and execute social engineering campaigns. Students explore advanced OSINT tools enhanced by machine learning, examine RAG-powered penetration testing workflows, and understand how adversaries craft personalized phishing attacks and convincing deepfakes to compromise enterprise security.
Delve into how attackers weaponize AI to discover and exploit vulnerabilities. Participants will uncover how traditional exploitation frameworks evolve with machine learning, examine automated code analysis techniques, explore AI-enhanced memory manipulation attacks, and understand how intelligent patch analysis accelerates zero-day discovery.
Explore cutting-edge AI applications in malware engineering and defense evasion. Students learn how neural networks transform malware development, grasp how attackers circumvent AI safety guardrails, demonstrate sophisticated evasion techniques powered by machine learning, and examine living-off-the-land tactics enhanced through computational intelligence.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources