SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
In this exclusive webcast, SANS Expert Dave Shackleford and Google Product Manager Badr Salmi share insights based on Google reCAPTCHA Enterprise platform. You will learn how reCAPTCHA Enterprise employs intelligent risk assessment based on real-time user behavior analysis. Download the on-demand webcast now, and discover how reCAPTCHA Enterprise can provide organizations an entire ecosystem of tools for both detecting and responding to fraud.
The Internet Storm Center is all about "coloring your logs". Finding out what matters and doesn't matter by adding context to otherwise abstract datapoints like IP addresses and domain names. This free data is made available via our website and easy to use APIs. During this session, we will talk about some of the changes we have made to make the data more useful and more available. We will also illustrate how you can learn about ongoing trends and improve your skills via our amazing collaborative community.
Security awareness training is like salt. Like every dish, every organisation needs it. Often we ask our colleagues to take security awareness training once each year - a big old mouthful of salt - and then act surprised when people continue to make mistakes, dislike security, and do not develop a learning mindset.
The landscape of cyber threats against AI and ML systems is ever-evolving, with dire consequences for industries that increasingly rely on these technologies. Staying abreast of the adversary's tactics and techniques is crucial.
The Rise of Public Cloud Providers such as Amazon Web Services (AWS), Google Cloud (GCP), and Microsoft's Azure which serves the computing needs for small, medium and large businesses all over the world and there is no sign of any slowing the move to the “cloud”. These same Public Cloud providers have had at the same time become more complicated each day as we are creating more complex security holes with new cloud services, offerings, deployment types, design patterns, developer patterns, business needs, and speed to execution from the developers to the cloud security professionals where is no room to make a mistake that will bring your company to the front page news.
In this series, Dean Parsons will review observed ICS attacks in the Oil & Gas, Electric and Water sectors and map them to the MITRE ATT&CK ICS framework. Throughout this series, Dean will review the most common attacker tactics and techniques used across commonly targeted critical infrastructure sectors.
Join us for a walk through of everything new in cloud forensics and the latest major update for FOR509: Enterprise Cloud Forensics and Incident Response course.
As business applications have moved from monolithic blocks of code to distributed collaborations across multiple services, new forms of vulnerabilities have emerged and attackers have taken advantage of them. To explore this topic, SANS conducted a survey to collect information around industry practices in application security, focusing on Application Programming Interface (API) security awareness, processes, and controls.
Have you heard that SANS has a new Advanced Python Automation class? Are you interested in trying out some of the content? Join us for this workshop where Senior SANS Instructor and course author Mark Baggett will deliver the first hour and a half of content.
The increasing reliance on cloud computing has driven the need for efficient and secure IT environments, necessitating the development of robust engineering skills across various domains. This keynote speech will explore the world of cloud investigations, focusing on the critical intersection of data engineering, infrastructure as code (IaC), and Continuous Integration/Continuous Deployment (CI/CD) pipelines. Attendees will learn about the latest trends, best practices, and real-world applications demonstrating how these engineering disciplines can significantly enhance cloud security, performance, and scalability. By the end of the session, participants will have gained valuable insights and practical strategies to help their organizations adapt and excel in the rapidly evolving cloud-centric landscape.Learning Objectives: Understand the fundamentals of cloud investigations and their importance in ensuring secure and efficient IT environments in the cloud.Gain insights into data engineering techniques, including data collection, storage, processing, and analysis, and learn how they contribute to effective cloud investigations.Explore the principles of infrastructure as code (IaC), its benefits in managing and provisioning cloud resources, and how it supports cloud investigations by improving security, compliance, and infrastructure management.Examine the role of CI/CD pipelines in promoting rapid and reliable software delivery, and learn how they facilitate cloud investigations by fostering transparency, traceability, and automated testing.Discover emerging trends and best practices for integrating data engineering, infrastructure as code, and CI/CD pipelines in cloud investigations to optimize security and performance.Learn from real-world examples and case studies that demonstrate the successful application of these engineering disciplines in cloud environments.
Over the past year, cyber threats have continued to plague organizations of all types. From geopolitical conflicts such as the war in Ukraine to the increased use of social engineering techniques by adversaries, cyber threat intelligence (CTI) professionals have had a challenging time providing actionable intelligence to their consumers.
It appears that every few months, there's news of yet another cloud breach stemming from a carelessly configured cloud storage solution. While this isn't the default for most cloud vendors, some users still manage to make their cloud data publicly accessible by going out of their way - sometimes to a significant extent. Whether it's out of ignorance or convenience, it doesn't matter - this practice must come to an end.To address this issue, we've developed a workshop that equips attendees with various techniques and methods to identify and rectify cloud storage misconfigurations in their own cloud accounts. We'll even demonstrate some ways to prevent these misconfigurations from happening in the first place. Although the chosen vendor for this workshop is AWS, due to its Simple Storage Service (S3) being the one making making headlines, misconfigurations could occur in any cloud environment. Hence, the techniques discussed in this workshop will be applicable to all cloud vendor environments, including Azure, Google Cloud Platform, and Oracle.