SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Cyberattacks are evolving, and your defenses need to, too. Join SEC401 author Bryan Simon, GSE, for this webcast unveiling the game-changing 2024 update to SEC401 Security Essentials: Network, Endpoint, and Cloud.
In recent years, the cyber threat landscape has evolved significantly, blurring the lines between tactics, techniques, and procedures (TTPs) used by cybercrime and nation-state-sponsored attacks. On this webcast, SANS certified instructors Mat Fuchs and Josh Lemon will explore results of our 2024 Threat Hunting Survey, and reveal how organizations are changing their proactive hunting activities and their use of hunting for unusual patterns, behaviors, and artifacts within network traffic and endpoints to catch threat actors who continually try to side-step detections. Register for this webcast now, and you will automatically receive the companion white paper upon publication.
The modern threat landscape is a maze of complexity and adversaries that want to impact your organization. The time of “good enough” security is over. We’ve got to look elsewhere in our environments, integrating as many sources of telemetry as possible into your security program.
This presentation explores the dynamic landscape of securing Microsoft Azure by addressing the relationship between reconnaissance and password guessing.
The cloud landscape is always changing, and organizations that focus on old school attacks will catch some, but not all of them. This talk will look at how the attack surface changes in a public cloud, and we will focus in on three attack scenarios as examples. Join Ryan Nicholson, GSE and GX certified, where we will discuss how the attacks work and how to protect and detect them. If you are a cloud novice or expert, you will find something new to take back to work.
From one of our early GSE’s (GIAC Security Expert) Mark in this presentation will explore an unpatched vulnerability within Windows, one that attackers can likely exploit to bypass your defenses. Through the lens of this attack, we'll address a significant question: "Are programming skills a requisite for excelling in the field of information security?" Recent research indicates that approximately 20% of entry-level positions in information security demand proficiency in programming. Yet, the ongoing debate in online forums highlights the uncertainty surrounding the necessity of coding skills. Join Mark as we navigate through this discussion, who has vast experience on various cybersecurity roles through his certifications and work experience, examining the intricate relationship between coding expertise and achieving success in the realm of information security.
As the Internet celebrates 31 years, Identity, Zero Trust, Cloud, and AI currently have all the attention. Defenders face numerous challenges and headwinds in this complex, ever-expanding interconnected ecosystem of commerce, information exchange and cyber warfare. Endpoint, IDS and SIEM are so yesterday. Is network detection even worth mentioning? In this talk, Corelight will explain how elite cyber defenders are updating architecture and capabilities to ensure visibility at the network layer comprehensively, and why ground truth obtained from the network is essential to cyber defense posture now more than ever.
Ahoy matey! Are ye setting off to sail the cyber seas but unsure of yer treasure map or the seaworthiness of yer vessel? Are ye strugglin' to muster a hearty crew? In need of counsel from a seasoned sea dog, are ye? Aye, if that be yer quest, this dead man’s tale's for you! We'll be shorin' up yer venture by recruiting a fearless SOC crew, readying yer ship and tools, and charting a course through the treacherous online seas towards the island of SOC riches. So join John Hubbard, multiple GIAC certified holder, to hoist the mainsail, sharpen your cutlass, and prepare for battle!Yo, Ho, Yo, Ho! A Pirate’s Life For Me (and You)!
The development process is now so complex, so widespread, and so fast-moving that it’s difficult for enterprises to fully understand and manage it competently, much less defend effectively against attacks. Complex applications under development may require input from multiple teams that are typically unaware of one another’s activities. They may use third-party code from outside organizations that hasn’t been thoroughly vetted. And they may be written using tools, such as automation and AI, whose impact isn’t fully understood.
Step into a world where cutting-edge defense meets practicality in cybersecurity! "SANS Secure Your Fortress" will teach you how to master the latest and most effective defense techniques. Whether you're a seasoned expert or just beginning your cyber journey, this event is for you.
JSON Web Tokens (JWTs) are a popular way of securely transmitting information between parties. They have numerous benefits, such as being stateless, easily verifiable, and compatible with many different platforms. However, despite their advantages, JWTs can also present a number of security risks if not properly implemented or used.
Balancing the scales between safeguarding information assets and enabling business growth demands not just technical acumen but a strategic mindset.