SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Learn a repeatable process for web application penetration testing and gain the skills to uncover vulnerabilities and communicate their business impact.
Every day of SEC542 gives you invaluable information from real-world testing you cannot find in a book.
SEC542: Web Application Penetration Testing and Ethical Hacking teaches students how to identify, exploit, and demonstrate the real-world impact of critical web application vulnerabilities. Through a structured, repeatable methodology, students learn to move beyond automated scanners and conduct professional-grade penetration tests. The course emphasizes both technical skill development and effective communication of risk to improve organizational security posture.
Eric Conrad, a SANS Faculty Fellow and course author, has 28 years of information security experience. Eric is the CTO of Backshore Communications and his specialties include Intrusion Detection, Threat Hunting, and Penetration Testing.
Read more about Eric ConradTimothy McKenzie redefined offensive security through decades of Red and Purple Team operations, advancing the industry’s threat simulation standards and influencing thousands of cybersecurity professionals with his adversary emulation strategies.
Read more about Timothy McKenzieBojan Zdrnja is a globally respected cybersecurity expert and CTO at INFIGO IS, renowned for his leadership in offensive security, red teaming, and his extensive contributions to the SANS Internet Storm Center and European cybersecurity initiatives.
Read more about Bojan ZdrnjaExplore the course syllabus below to view the full range of topics covered in SEC542: Web App Penetration Testing and Ethical Hacking.
This section introduces web application penetration testing from an attacker’s perspective, emphasizing foundational web technologies, DNS reconnaissance, and HTTP protocol security. It covers essential tools like BurpSuite Pro and ZAP for intercepting traffic, as well as methodologies such as the OWASP assessment framework.
This section introduces techniques like fuzzing, vulnerability scanning, and forced browsing to uncover hidden content and potential vulnerabilities. It also explores authentication, authorization, and session management mechanisms—covering common attack vectors and tools like BurpSuite, ZAP, and ffuf.
This course section focuses on identifying and exploiting critical vulnerabilities such as authentication and authorization bypasses, injection flaws, and insecure deserialization. Emphasizing manual testing techniques, students gain hands-on experience with command injection, file inclusion, and various forms of SQL injection.
This section focuses on advanced injection flaws, highlighting various forms of XSS and introducing tools like BeEF for browser exploitation. It also explores API and data attacks through REST, SOAP, and AJAX, and concludes with practical labs on complex vulnerabilities like SSRF and XXE, emphasizing the chaining of exploits and client-side analysis.
This section teaches how to escalate access, pivot within networks, and understand the broader business impact of vulnerabilities. We cover advanced techniques using tools like Metasploit and Nuclei, explore logging and monitoring, and introduce LLM-specific vulnerabilities – ending with a hands-on challenge on manual exploitation and custom tool adaptation.
During section six, students form teams and compete in a web application penetration testing tournament.
Responsible for analyzing the security of new or existing computer applications, software, or specialized utility programs and delivering actionable results.
Explore learning pathResponsible for the secure design, development, and testing of systems and the evaluation of system security throughout the systems development life cycle.
Explore learning pathResponsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.
Explore learning pathResponsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.
Explore learning pathApplication penetration testers probe the security integrity of a company’s applications and defenses by evaluating the attack surface of all in-scope vulnerable web-based services, clientside applications, servers-side processes, and more. Mimicking a malicious attacker, app pen testers work to bypass security barriers in order to gain access to sensitive information or enter a company’s internal systems through techniques such as pivoting or lateral movement.
Explore learning pathResponsible for developing, creating, modifying, and maintaining computer applications, software, or specialized utility programs.
Explore learning pathResponsible for planning, preparing, and executing system tests; evaluating test results against specifications and requirements; and reporting test results and findings.
Explore learning pathAdd a GIAC certification attempt and receive free two practice tests. View pricing in the info icons below.
When purchasing a live instructor-led class, add an additional 4 months of online access after your course. View pricing in the info icons below.
This course taught me to truly focus on the methodology while performing a pen test. During the Capture the Flag event, I realized how much time can be wasted if you fail to respect your methodology.
As a developer, SEC542 is exactly the kind of course I needed. It showed us what the bad guys look for, which helps protect our software.
SEC542 provides rapid exposure to a variety of tools and techniques invaluable to recon on target site.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources