SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsJoin a webcast or podcast in real-time or dive into our media library of recorded presentations, webinars, podcasts, and live streams all led by SANS seasoned cybersecurity experts.
Access our latest expert-led sessions.
Discover our specialized, in-depth summit presentations, packed with insights and takeaways you can use today from pioneers and practitioners in their fields.
Register for our next interactive webinar and pose your question to our featured speakers as they shine a light on industry happenings, vulnerabilities and identify, defend and recover tactics.
Get expert perspectives on the threats and technologies shaping today’s security landscape. Whether you’re commuting or taking time to learn, our podcasts deliver timely analysis, thought-provoking interviews, and real-world insights that make it easy to stay informed wherever you are.
Training in penetration testing, red teaming, purple teaming, and exploit development, provides the skills needed to simulate real-world attacks, evade defenses, and enhance security through adversary emulation and improving defense strategies.
Learn moreEffective Cyber Defense enables organizations to anticipate, withstand, and recover from cyber-attacks through proactive monitoring, threat detection, and incident response. It combines security operations, automation, and resilient architecture to reduce risk and minimize attack impact.
Learn moreDigital Forensics and Incident Response (DFIR) is essential to understand how intrusions occur, uncover malicious behavior, explain exactly “what happened”, and restore integrity across digital environments.
Learn moreResilient cybersecurity leadership is critical for protecting digital assets, managing cyber risks, and aligning security with business goals. Informed leaders bridge the gap between technical teams and executives, drive security strategies, ensure regulatory compliance, manage effective incident response, and foster a security-first culture.
Learn moreCloud security encompasses technologies, policies, and controls that protect data, applications, and infrastructure in cloud environments. Knowing how to safeguard sensitive information in cloud environments is crucial for preventing cyber threats, ensuring compliance, and maintaining business continuity.
Learn moreIndustrial Control Systems (ICS) and Operational Technology (OT) are increasingly targeted by cyber threats, putting businesses, governments, and national infrastructure at risk. Specialized ICS/OT security training is vital to securing operations across all industries and defending the systems that make, move, and power the world.
Learn more