SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsExplore content featuring this instructor’s insights and expertise.
As the Internet celebrates 31 years, Identity, Zero Trust, Cloud, and AI currently have all the attention. Defenders face numerous challenges and headwinds in this complex, ever-expanding interconnected ecosystem of commerce, information exchange and cyber warfare. Endpoint, IDS and SIEM are so yesterday. Is network detection even worth mentioning? In this talk, Corelight will explain how elite cyber defenders are updating architecture and capabilities to ensure visibility at the network layer comprehensively, and why ground truth obtained from the network is essential to cyber defense posture now more than ever.
As the internet celebrates 31 years of public availability, Identity, Zero Trust, Cloud and AI currently have all the attention. Defenders face numerous challenges and headwinds in this complex, ever-expanding interconnected ecosystem of commerce, information exchange and cyber warfare.Endpoint, IDS and SIEM are so yesterday. Is network security monitoring even worth mentioning? In this talk, Corelight will explain how elite cyber defenders are updating architecture and capabilities to ensure visibility at the network layer comprehensively, and why ground truth obtained from the network is essential to cyber defense posture now more than ever.