SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsJames Berthoty is a security engineer turned analyst, now running Latio Tech to help security engineers find better tools. He’s a former cloud and application security engineer at companies from startups to regulated enterprises, now helping vendors make better tools, and security teams find the right tool for them.
Explore content featuring this instructor’s insights and expertise.
In the world of application security, the influx of alerts has reached overwhelming levels, making it increasingly challenging to effectively monitor and respond. This surge in alerts often leads to unresolved issues and persistent vulnerabilities. Are we sounding the alert too frequently? Is there a way to strike a balance between reducing the noise and maintaining robust security?
Detecting and responding to cloud attacks has never been more challenging. Modern attacks and the ever-changing nature of cloud infrastructure and applications make security teams’ lives more difficult than ever. A new approach is needed – one that can provide a fully traceable & explainable runtime security story spanning the entire cloud technologies stack.