SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsAccess our free toolkit of resources and start reaping the benefits of open source tools, shared tips and tricks, and downloadable policy templates to help protect your digital space.
Unlock a wealth of resources to help bolster your cybersecurity practices.
Our SANS instructors have built freely-available tools to help you implement better security.
Access helpful posters and cheat sheets to support tricky techniques at all levels.
Access our collection of policy templates designed to help you clearly define requirements and guidelines for your organisation.
Find key content designed to support you in your chosen field of cybersecurity.
Training in penetration testing, red teaming, purple teaming, and exploit development, provides the skills needed to simulate real-world attacks, evade defenses, and enhance security through adversary emulation and improving defense strategies.
Learn moreEffective Cyber Defense enables organizations to anticipate, withstand, and recover from cyber-attacks through proactive monitoring, threat detection, and incident response. It combines security operations, automation, and resilient architecture to reduce risk and minimize attack impact.
Learn moreDigital Forensics and Incident Response (DFIR) is essential to understand how intrusions occur, uncover malicious behavior, explain exactly “what happened”, and restore integrity across digital environments.
Learn moreResilient cybersecurity leadership is critical for protecting digital assets, managing cyber risks, and aligning security with business goals. Informed leaders bridge the gap between technical teams and executives, drive security strategies, ensure regulatory compliance, manage effective incident response, and foster a security-first culture.
Learn moreCloud security encompasses technologies, policies, and controls that protect data, applications, and infrastructure in cloud environments. Knowing how to safeguard sensitive information in cloud environments is crucial for preventing cyber threats, ensuring compliance, and maintaining business continuity.
Learn moreIndustrial Control Systems (ICS) and Operational Technology (OT) are increasingly targeted by cyber threats, putting businesses, governments, and national infrastructure at risk. Specialized ICS/OT security training is vital to securing operations across all industries and defending the systems that make, move, and power the world.
Learn moreUnlock exclusive access to members-only training and tools, plus immediate updates on the latest in cybersecurity.