SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
インターネットは常に変化をし続けています。そういった環境において、AIを活用することで、OSINTサイクルのあらゆる段階においても、効率性において圧倒的なアドバンテージを得られます。 このWebcastでは、OSINT技術を利用している方がAIの活用によってどのような業務改善を行えるのかを共有し、SANSトレーニングの高度なOSINTコースであるSEC587の最近の更新情報について共有します。
The SANS Faculty, experts and practitioners in cybersecurity, have been working to build and enhance the AI-driven cybersecurity landscape. In this forum, you will get a unique opportunity to hear firsthand accounts of how they utilize the power of Artificial Intelligence and Machine Learning to make significant advancements in cybersecurity.
Data can end up in the unlikeliest of places, even for those organizations that have developed formal data governance policies and implemented technical controls to (try to) keep data in central data stores. Especially troublesome is data stored and worked with on user endpoints—workstations, laptops, devices—such as original unstructured files or containing data extracted from structured data sources.
The cloud has changed infrastructure for all organizations and Federal agencies are no exception. However, it’s not as easy as simply “flipping the switch” because there are a myriad of regulatory requirements and considerations to navigate, and it requires careful planning and implementation.
Threads, stacks, and heaps! Part 8 will take a look at using Windows APIs to create threads, heaps, and using a debugger to view stacks. We will also talk about some of the myths around stack growth versus stack usage.
In the field of cybersecurity, we are failing to acknowledge that we have a big problem. Our job titles and job descriptions have the word security in it even though security isn’t our job. I have never met a security professional who claims that their organization will never be breached. Yet, we call ourselves security? When a breach does occur, it reflects poorly on us. Did it mean we did our jobs poorly that day? Let’s have the difficult, but long needed, discussion about what we need to do to better align our roles in supporting our organizations as well as our own expectations around what our jobs actually are.
The number of cloud security breaches in the headlines have been staggering lately. It seems like a week cannot go by without a massive amount of sensitive data being leaked from either AWS, Azure, or Google Cloud.
Join us to explore how you can enable secure access to any app or resource, from anywhere using Microsoft’s identity-centric Security Service Edge (SSE) solution. Our experts will delve into Microsoft Entra Private Access, a core component of SSE, focusing on key use cases and scenarios. Discover how this solution enhances security for private apps and resources, ensures user productivity, and reduces the complexity and risk of legacy VPNs.
In this webcast, we will review the attack at Achilles Systems, their previous security capabilities, and why their existing controls were insufficient to help them resist the attack. Then we will dive deep into what could have been done to better tailor and augment those controls to reduce or eliminate the impacts from the attack.
Crypto miners are increasingly targeting cloud environments, leveraging the vast resources of organizations to mine cryptocurrency, which leads to inflated costs and resource depletion.
Defending civilisation is a team sport. We need to work together to improve cyber security. We all have a vested interest in supporting our teams, organisations, and communities for the benefit of relevant cyber security journeys. Peter will tell success stories and challenges in his own journey of building a community of engaged practitioners. Come along to hear his story, see where you can make a difference, and perhaps be inspired to make a difference yourselves.
Challenge yourself and your peers with an engaging tech trivia session covering various aspects of the cybersecurity field. From trending topics like AI and emerging threats to fundamental concepts in digital forensics, this interactive event is designed to test and expand your cybersecurity expertise. Led by one of our expert NetWars authors, this session offers insights into the ever-evolving cybersecurity landscape while providing an opportunity for friendly competition and skill enhancement. Join us and showcase your cyber knowledge in a fun and immersive, Q&A environment!