SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsAnalyzes network traffic and packet captures to detect anomalies and intrusions, while building advanced network detection rules and alerts.
Perform deep packet inspection, anomaly detection, and advanced rule creation to proactively identify threats. Leverage network mapping, signature development, and visualization tools to enhance security posture and ensure robust defense against cyber intrusions.
Analyze network traffic patterns, identify anomalies, and dissect packet captures to detect signs of intrusion and malicious activity.
Develop advanced detection rules, alerts, and dashboards to proactively visualize threats and vulnerabilities across network infrastructure.
Coordinate incident response, mitigate intrusions, and collaborate with stakeholders to secure critical network operations and assets.
Synthesizes intelligence for reporting, evaluates SIGINT/cyber collection, collaborates with analysts, and maintains databases and customer feedback.
Explore learning pathProvides software and hardware support for cyberspace operations by identifying vulnerabilities and developing cyberspace effect capabilities.
Explore learning pathAnalyzes intercepted intel to map target networks, assess value, and find exploitation strategies, focusing on comms tech and system implementation.
Explore learning pathUses tools to conduct navigation, forensics, and recon in support of offensive cyber ops; performs actions on-net when authorized and directed.
Explore learning pathConducts host system analysis using built-in tools, evaluating services, permissions, and configurations to detect and address system threats.
Explore learning pathSupports Cyber Protection Team with infrastructure knowledge, mission scoping, and understanding of enterprise and tactical network systems.
Explore learning pathCollaborates to identify access and collection gaps using cyber resources and techniques to penetrate target networks and support mission operations.
Explore learning pathCoordinates cyber operations plans, working with analysts and operators to support targeting and synchronization of actions in cyberspace.
Explore learning pathThere are numerous different roles in cybersecurity and where you fit depends on your interest level. SANS New to Cyber offers courses, certifications, and free resources for anyone interested in getting started in cybersecurity.
Explore New to Cyber