SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsInstalls, configures, maintains systems and hardware, and administers user accounts, ensuring system reliability and operational support.
Ensure optimal system performance through proactive monitoring, rapid troubleshooting, and effective resource management. Administer robust security measures, enforce compliance with IT policies, and maintain virtualized and cloud-based infrastructure.
Monitor, optimize, and troubleshoot system performance, ensuring continuous availability and rapid recovery from failures.
Administer security policies, manage user accounts and access rights, and enforce system hardening standards.
Deploy, configure, and maintain virtualized environments and cloud-based infrastructures to support organizational needs.
Manages and maintains databases or data systems for efficient storage, querying, and access to organizational data assets and records.
Explore learning pathDelivers technical support to users, helping them resolve issues with client hardware/software according to organizational service processes.
Explore learning pathOversees full lifecycle of information systems from design through evaluation, ensuring alignment with functional and operational goals.
Explore learning pathImplements and maintains network services, including hardware and virtual systems, ensuring operational support for infrastructure platforms.
Explore learning pathPlans and executes system tests, analyzing results to verify compliance with technical and operational requirements and expectations.
Explore learning pathDevelops business and IT process architectures, creating baseline and target architectures to meet mission or enterprise goals.
Explore learning pathTranslates functional needs into technical solutions by consulting with customers and developing system architectures and requirements.
Explore learning pathConducts research in systems/software engineering to develop capabilities and identify vulnerabilities, with security integrated throughout.
Explore learning pathThere are numerous different roles in cybersecurity and where you fit depends on your interest level. SANS New to Cyber offers courses, certifications, and free resources for anyone interested in getting started in cybersecurity.
Explore New to Cyber