SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class from a location near you or virtually from anywhere
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Develop advanced product security testing skills to combat supply chain attacks and protect hardware, software, and network infrastructure.
There's nothing out there like this course and it surpassed what I expected out of it.
SEC568 delivers advanced product security training and supply chain risk analysis. Through more than 20 hands-on lab exercises, students learn systematic methodologies for assessing security risks in third-party products. The product security course progresses from basic enumeration to deep technical analysis, covering hardware devices, mobile applications, proprietary protocols, and network traffic analysis. Using tools like Corellium, APKLab, and Scapy, students master techniques for firmware analysis, binary code examination, and protocol dissection. The course culminates in a comprehensive capstone event where students conduct a complete product security assessment on a real application.
Douglas McKee, Executive Director of Threat Research at SonicWall, revolutionized cybersecurity by spearheading the detection of over 210,000 novel malware variants and pioneering real-time threat intelligence that accelerates defense responses.
Read more about Douglas McKeeIsmael Valenzuela, VP of Threat Research & Intelligence at Arctic Wolf, has fortified global cybersecurity by leading critical threat intelligence initiatives and pioneering defenses against AI-driven threats like deepfakes and ransomware.
Read more about Ismael ValenzuelaExplore the course syllabus below to view the full range of topics covered in SEC568: Product Security Penetration Testing - Safeguarding Supply Chains and Managing Third-Party Risk.
Introduces fundamental principles of supply chain attacks and product security testing. Focuses on online product research and basic enumeration using tools like binwalk, Corellium, and APKLab. Students learn initial methodology through hands-on exercises with the supplied virtual machines.
Covers Windows platform analysis and networking concepts using tools like Attack Surface Analyzer and Sysinternals. Introduces Exploratory Data Analysis with Python and Jupyter Notebooks for threat modeling and data visualization.
Focuses on deep enumeration through binary code analysis and network protocol investigation. Students learn to use decompiler tools, analyze application updates, and manipulate network packets using Scapy.
Concludes our deep enumeration study and focuses on risk analysis. Covers protocol dissection, network fuzzing, and risk assessment using attack trees and DREAD scoring methodology.
Provides hands-on experience conducting a complete product security test on a real application, applying all concepts learned throughout the course using provided tools and cloud-based labs.
Plans and executes system tests, analyzing results to verify compliance with technical and operational requirements and expectations.
Explore learning pathResponsible for testing, implementing, deploying, maintaining, and administering infrastructure hardware and software for cybersecurity.
Explore learning pathThis is exactly what we've been talking about at work with threat modeling and software being added to the network.
Learned more useful skills on Day 1 than I've learned in a month elsewhere.
This is hard.... But very fun!
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources