SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsSarah and her family were thrilled with their new smart home devices, enjoying the ease of controlling lights and locks with just a few taps or voice commands. However, their excitement turned to alarm one night when Sarah noticed her smart thermostat adjusting itself unexpectedly. Initially dismissing it as a glitch, she became concerned when the lights began flickering and the front door mysteriously unlocked. The situation escalated when a stranger's voice came through the baby monitor, describing her baby's room in detail. At that moment, Sarah realized their sanctuary had been breached. Cyber criminals had taken control of their smart devices, compromising their privacy and safety. The thought of strangers watching her baby sleep left Sarah feeling vulnerable and exposed. This unsettling experience underscored Sarah’s need to secure her smart home devices, not only the technology but also the safety and peace of mind of her entire family.
Stephen Sims, an esteemed vulnerability researcher and exploit developer, has significantly advanced cybersecurity by authoring SANS's most advanced courses and co-authoring the "Gray Hat Hacking" series.
Learn more