SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Gain essential technical and leadership skills to effectively manage security programs, covering key topics like security architecture, vulnerability management, cloud security, and GenAI security.
This is an excellent primer for management types. I come from a technical background and can see the value there plain as day.
LDR512 is security manager training that equips security leaders with the technical and leadership skills needed to manage security programs, covering essential topics like frameworks, vulnerability management, and cloud security. As a foundational cyber security management course, it also prepares professionals for the GSLC certification (GIAC Security Leadership Certification). Through hands-on Cyber42 simulations, participants build real-world skills for developing effective security teams and managing information risk.
Frank Kim is the Founder of ThinkSec, a security consulting and CISO advisory firm. He leads the Cybersecurity Leadership and Cloud Security curricula at SANS, as well as authors and instructs multiple SANS courses.
Read more about Frank KimExplore the course syllabus below to view the full range of topics covered in LDR512: Security Leadership Essentials for Managers.
This section introduces essential knowledge for security leaders, covering cybersecurity frameworks, risk management, policy development, and team structure to support effective security program management.
This section covers traditional and modern security architectures, focusing on network security, endpoint controls, cloud security with AWS, IAM risks, and the Zero Trust Model to address evolving security challenges.
Section three covers security engineering best practices, including cryptography, privacy concepts, application security with DevSecOps, Infrastructure as Code (IaC), and securing generative AI (GenAI) and Large Language Models (LLMs).
This section equips managers to lead security initiatives, covering vulnerability management, security awareness, vendor negotiation, and effective project execution to foster a security-aware culture and drive project success.
Section five focuses on detection and response, covering SIEM and SOC functions, incident response, business continuity, disaster recovery, and physical security controls for comprehensive security operations management.
Perform cybersecurity audits on the organisation’s ecosystem. Ensuring compliance with statutory, regulatory, policy information, security requirements, industry standards and best practices.
Explore learning pathPlans and designs security-by-design solutions (infrastructures, systems, assets, software, hardware and services) and cybersecurity controls.
Explore learning pathLead, govern, and manage this risk for your organization.
Explore learning pathCollect, process, analyse data and information to produce actionable intelligence reports and disseminate them to target stakeholders.
Explore learning pathOversees a portfolio of IT capabilities aligned to enterprise goals, prioritizing needs, solutions, and value delivery to the organization.
Explore learning pathResponsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.
Explore learning pathResponsible for managing the cybersecurity of a program, organization, system, or enclave.
Explore learning pathResponsible for managing the Communications Security (COMSEC) resources of an organization.
Explore learning pathDesigns and evaluates information system security throughout the software lifecycle to ensure confidentiality, integrity, and availability.
Explore learning pathOversees program, system, or enclave cybersecurity, ensuring protection from cyber threats and compliance with organizational standards.
Explore learning pathManages organization’s COMSEC resources to ensure secure handling of communications materials as required by national and agency policies.
Explore learning pathManage the organisation's cybersecurity-related risks aligned to the organisation’s strategy. Develop, maintain and communicate the risk management processes and reports.
Explore learning pathThis expert applies digital forensic skills to a plethora of media that encompasses an investigation. If investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked, damaged or used in a crime, this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence.
Explore learning pathDesigns system data models and flow architectures to meet mission or business data requirements using scalable and efficient solutions.
Explore learning pathDesigns secure enterprise systems considering environmental constraints and translates them into enforceable security processes and protocols.
Explore learning pathCreates cyberspace strategies and policies that align with mission objectives and support organizational readiness and future initiatives.
Explore learning pathConducts independent assessments of IT system security controls to evaluate their overall effectiveness in protecting mission-critical systems.
Explore learning pathImproves cybersecurity knowledge, skills and competencies of humans.
Explore learning pathResponsible for accepting system risk on behalf of the organization, ensuring acceptable security levels for mission, reputation, and operations.
Explore learning pathSets direction and policies for cyber operations, assumes risk decisions, and aligns mission objectives with available cyber resources.
Explore learning pathAdd a GIAC certification attempt and receive free two practice tests. View pricing in the info icons below.
When purchasing a live instructor-led class, add an additional 4 months of online access after your course. View pricing in the info icons below.
This course continues to challenge and develop leadership capabilities to better prepare individuals to help their organizations thrive within the cyberspace.
The content makes us truly understand why and what we should be doing as a cybersecurity leader.
For a Security Manager, this class is spot on!
Cyber42 was an amazing game and experience. Not only building connection with our peers, but also creating a rich dialogue. More importantly, the sharing and decision analysis really helped us learn the materials more effectively.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources