SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Enhance your proficiency in operational cybersecurity decision-making through immersive team-based simulations with Cyber42. Practice agile decision-making and information synthesis, key skills required for success in leadership roles. Engage in thought-provoking discussions and gain practical insights to improve your cybersecurity competencies.
After enumerating a list of loaded modules, it's only fitting to get started with what normally comes next, parsing exports of a DLL. Before we can do that, we will have to understand the anatomy of executable images. This means parsing PE headers. It would be great to have the following programs installed before this Part 6: WinDbg, PE Explorer by Pavel.PS: don't forget your files from Part 5; you'll need them!
In an increasingly complex and dynamic cyber threat landscape, decision-makers are turning to actionable, contextualized threat intelligence to bolster cyber resilience and fulfill mission or business objectives. With the advent of advanced AI technologies, including Large Language Models (LLMs), the scope and effectiveness of Cyber Threat Intelligence (CTI) are being revolutionized.
Adversary emulation stands as an indispensable cornerstone in the cybersecurity domain, empowering organizations to proactively evaluate and bolster their defensive capabilities against real-world threats. In this presentation, we delve into the practical application of adversary emulation, leveraging the robust Caldera open-source platform. This demonstration serves as a preview of one of the engaging labs featured in our cutting-edge course, SEC598: Security Automation for Offense, Defense, and Cloud.
Part 3: Continuing the Cloud Security Flight Simulator series, join SEC540: Cloud Native Security and DevSecOps Automation instructor Jon Zeolla for a webcast on software supply chain security.
In today's connected world, where threat actors make every effort to blend in, easily detecting their malicious activities is becoming more difficult. In this webcast, SANS Certified Instructor Nik Alleyne, will help us to understand how we can use machine learning and deep learning algorithms, to potentially highlight these threats as they fly under our traditional monitoring radar.
近年脅威アクターは複雑な技術を悪用して攻撃の痕跡を隠すようになっているため、悪意ある兆候を検知することが難しくなっています。このWebcastではSANS認定インストラクターのNik Alleyneが機械学習とディープラーニングのアルゴリズムを活用することで、従来の監視・検出手法を潜り抜けていたこれらの脅威を潜在的に浮き彫りにする方法を共有します.
Join SEC568: Product Security Penetration Testing - Safeguarding Supply Chains and Managing Third-Party Risk course author Douglas McKee for an insightful webcast presentation as he walks through the work flow of product security assessment depicted in the Overall Product Security Assessment Process poster.
The 2023 SANS ICS/OT Cybersecurity Survey received over 700 responses representing a wide range of industrial verticals from energy, chemical, critical manufacturing, and nuclear to water management and several others.
As part of a mature cybersecurity program, organizations rely on penetration testing to find vulnerabilities before attackers do. But operational technology/industrial control systems are critical, and often fragile systems! How do we dare conduct pentests in these environments? Join Chris in a discussion of real-world experience testing water systems, an oil rig, and other critical systems - SAFELY.
In the final part of the Cloud Security Flight Simulator series, join SEC540 lead author and instructor Eric Johnson to learn how to enable workload identity for AWS Elastic Kubernetes Service (EKS) and Azure Kubernetes Service (AKS).
Corporations with a mature security organization should be doing threat hunting. Is this as simple as searching for known IOCs in our environment? While this is an important task, this is not threat hunting. Threat hunting is looking for unknown bad, which implies that there are no IOCs! Can AI and machine learning help us to do effective threat hunting? Are there real-world applications of these technologies that are useful today? Yes! This one hour webcast will discuss a variety of practical applications of machine learning and AI that organizations can implement today to augment our threat hunting capability.