SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsJosh leads global MDR at Uptycs, defending major international brands, while also serving as an independent DFIR expert advising legal, government, and commercial clients in Australia.
Learn moreJess Garcia is the founder and technical lead of One eSecurity, a global Information Security company specialized in Incident Response and Digital Forensics.
Learn moreMr. Poley is the Senior Threat Hunter for Intel 471, where he leads cyber threat hunting initiatives for customers. Mr. Poley has over 15 years of experience in the field of cybersecurity, working in a variety of roles that involve hands-on technical and leadership responsibilities. His expertise covers a wide range of areas, including threat intelligence, security monitoring, security automation, forensics, malware analysis, big data analysis, security research, incident response, and threat hunting. Prior to joining Intel 471, Mr. Poley worked as one of the primary threat hunters for the cyber threat hunting leader, Cyborg Security, later acquired by Intel 471. At Cyborg, Mr. Poley established himself as a true expert in the field. A former U.S. Army Ranger, Mr. Poley holds a M.S. of Science in Information Security Engineering from the SANS Institute and is also pursuing different ways to shape Cybersecurity in academia.
Learn moreAs a security researcher with extensive experience uncovering client-side web threats such as malvertising, I build my own tools, and collaborate with industry partners to take down threat actors. In addition to publishing original research on the Malwarebytes blog, I also share my discoveries with media outlets and present my work at security conferences.
Learn more