SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
This webcast takes a deep dive into the threats highlighted during the annual SANS keynote panel discussion at the RSA® Conference 2023. This webcast will include insight from SANS instructors Ed Skoudis, Heather Mahalik, Dr. Johannes Ullrich, and Katie Nickels on the dangerous new attacks techniques they see emerging. You’ll get actionable advice on the critical skills, processes, and controls needed to protect enterprises from these advanced attacks.Register for this webcast now and be among the first to receive this whitepaper from SANS author and Director of Emerging Security Trends John Pescatore and SANS Certified Instructor Domenica Crognale.
Our containers workshop will be a two-hour workshop that will focus on how we can assess vulnerabilities in containers. As containers are part of the modern software stack, your company may use containers locally on a system and remotely on servers. Containers can be deployed on stand-alone servers, to a container service like AWS ECS, and on orchestration technologies like Kubernetes. Given how ubiquitous containers are, you will likely either be working with or attacking them at some point in your career.
Every incident ends with a lessons learned meeting, and most executive summaries include this bullet point: "Leverage the tools you already paid for"Are you leveraging the tools you already paid for? Are you using the host-based firewall to block/alert when applications like PowerShell, PSExec, and WMIC attempt to make outbound connections from non-IT clients? Have you enabled AppLocker?
Whether it's a brick-and-mortar storefront or an e-commerce platform, no player in the retail space is safe from cyberattacks. Over the past decade, we have seen major breaches of big-name stores, resulting in multi-million dollar settlements and hundreds of millions of affected users. But what exactly is going on here? We will examine the mechanisms cybercriminals use to exploit retail stores and platforms, what they look for, and, most importantly, what can be done to thwart threats and leave cyber criminals on the shelf.
Presentation 1 - The Five ICS Cybersecurity Critical Controls for APAC PractitionersPeter Jackson, Certified Instructor CandidatePresentation 2 - Establishing the Link Between Corruption and CybercrimeJason Jordaan, Principal Instructor
SOF-ELK® (Security Operations and Forensics ELK) is a public, fully-configured, appliance-like distribution consisting of components from the Elastic Stack as well a hundreds of parsers and numerous dashboard for various log formats commonly encountered in incident response and security operations work.
SOF-ELK® (Security Operations and Forensics ELK)は、Elastic Stackのコンポーネントと、インシデントレスポンスやセキュリティ運用業務で必要とされることの多い様々なログフォーマット用の数百のパーサーと数多くのダッシュボードから構成されており、すぐに利用できるように事前に設定されたアプライアンスのようなディストリビューションとして公開されています。
Presentation 1 - DevSecOps - We Are The Champions and 2023 Chris Edmundson, Associate InstructorPresentation 2 - 2023 SOC Survey - Highlights and Deep Drive presentedChristopher Crowley, Senior Instructor
There is a common tug-of-war between SOC staff, detection engineers and CSIRT/DFIR professionals when determining how important or severe an alert or detection is.
この講演では、まずはじめにセキュリティ業界の現状を説明し、人材育成の重要性についてお話します。SANSでは70コース以上用意しており、セキュリティの知識レベルに合わせたコースをご受講いただけます。
Advanced Python CTF based on Mark Baggett’s SEC673 Advanced Information Security Automation with Python.
Sliver is rising in popularity and is thought to be taking significant market share off other well known C2 frameworks. Corelight Content can better power your Sliver detections highlighting what's on your network to build a strategic data reserve when you need to investigate an incident. Come learn about Corelight Content, insightful community developed detections, and an open NDR that puts the power in your hands.