SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsJay Lillie is VP Customer Success for CardinalOps where he helps organizations around the world improve their SIEM-based detection posture. After an early career in business process management and Big Data, his more recent experience in cybersecurity ranges from machine learning behavioral analytics to identity governance. He has paired his career in technology startups with a parallel career as a member of the US Marine Corps Reserves. Before he retired, his capstone military tour was as the Senior Enlisted Advisor for the Reserve component of the Marine Corps Cyber Warfare Group.
Explore content featuring this instructor’s insights and expertise.
“IT heroism” can be defined as relying on “individuals taking upon themselves to make up for a systemic problem.” As those who have seen the inside of a SOC can attest, this is not entirely uncommon in many Security Operations Centers!
Today, most security professionals are actively architecting and implementing cloud security controls across SaaS, PaaS, and IaaS environments. We’ve learned that what once worked on-premises may not work quite the same in the cloud, and a wide range of new and innovative security platforms and services have emerged and evolved in recent years to address critical cloud security use cases and categories, including: Cloud security monitoring and incident managementCloud workload and data protectionCloud security posture management (CSPM) and SaaS security posture management (SSPM)Cloud identity and access managementMachine learning and AI in cloud environmentsCloud Native Application Protection Platforms (CNAPP)Zero trust network access (ZTNA) and SASE/SSECloud security automation In the Cloud track at Cyber Solutions Fest 2024, leading solution providers and practitioners will highlight the newest techniques and technologies that organizations of all types and sizes are leveraging to better secure and manage their cloud services and environments. Talks and panels will cover all the topics mentioned, and more!Forum Highlights: Discover how industry leading technologies and techniques can your ability to better secure you cloud environments Learn from industry leaders as they dive into cutting-edge use case studies and specific examplesInteract with the SANS chair Dave Shackleford, speakers and peers in the interactive Slack workspace by posting questions and discussing the forum topic
In 2024, the SOC Survey continued to explore the detailed aspects of cybersecurity operations centers. The survey collected information on organizations’ capabilities, and what is outsourced. On this webcast, SANS Senior Instructor Chris Crowley examines survey results to understand how SOCs are architectured, favorite and frustrating technologies, staffing, funding, threat intel, and automation. Register for this webcast now, and you will automatically receive the companion white paper upon publication.
In the age of artificial intelligence (AI) and ever-evolving cyber threats, the landscape of security operations has witnessed a transformative shift. Our 2024 Detection & Response Survey delves into how organizations address critical aspects of detection, response, and the integration of these vital functions within organizations. On this webcast, SANS Certified Instructor Josh Lemon will provide insights into the prevalence of organizations maintaining separate detection and response teams, shedding light on the reasons behind such decisions and their implications for overall security posture. Register for this webcast now, and you will automatically receive the companion white paper upon publication.