SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Modern utility infrastructure is part of a connected ecosystem. From cloud-based applications to the Industrial Internet of Things (IIOT), more locally operated equipment is coming online to enhance efficiency, safety, and reduce error.
We are excited to invite you to an exclusive webcast where we'll unveil the latest updates to the SEC699 SANS Purple Teaming course. This session will provide an in-depth look at the enhancements we've made to ensure that our course remains at the forefront of cybersecurity training.
In this webcast, experts from SANS FOR589: Cybercrime Intelligence will explore the tactics and evolution of the notorious cybercriminal group SCATTERED SPIDER and The Com.
このWebcastでは、SANSの新規トレーニングコースである「FOR589: Cybercrime Intelligence」の開発者のふたりが、悪名高いサイバー犯罪グループScattered SpiderとThe Comの犯罪事例について取り上げます。
This presentation will review cybersecurity considerations when planning safe operations. Attendees will be introduced to the ISA 62443 risk management process and high-level risk assessment data gathering that will fuel their information gathering requirements.
In the dynamic realm of cloud security, organizations are in constant pursuit of innovative solutions to shield their cloud environments from the ever-growing array of threats. The SANS CloudSecNext Solutions Summit stands as a pivotal platform that brings to the forefront the latest trends, challenges, and solutions pivotal to cloud security.
As the digital landscape continues to evolve, so do the threats that put organizations at risk. With 2025 on the horizon, the urgency to anticipate and prepare for emerging cybersecurity challenges has never been greater. This webcast is designed specifically for cybersecurity practitioners who are looking to future-proof their skills and defenses to combat these challenges.
While GenAI allows organizations to tackle new challenges and minimize resource expenditure, it also presents several security risks, as is common with any new technology. Cybercriminals can exploit novel attack vectors, often due to organizations' limited understanding of GenAI's complexities.
Join us to learn strategies for integrating security seamlessly into your development process and fortifying your web applications against evolving threats.
Join us at the forefront of cybersecurity at "SANS Secure Your Fortress: 2024's Top Defense Strategies and Trends!"
Since 2017, the SANS ICS/OT Cybersecurity Survey has been a foundational benchmark for critical infrastructure asset owners and operators. On this webcast, SANS Certified Instructor Jason Christopher explores the growing trends in cyber threats, vulnerabilities, and risks across industrial environments, including actionable recommendations for how organizations can improve their security posture. As global incidents—and regulations—continue to focus on ICS/OT cybersecurity, it is vital that actionable information and benchmarks are provided to defenders working in this challenging field as they evaluate their ongoing efforts in 2024. Register for this webcast now, and you will automatically receive the companion white paper upon publication.
Directory enumeration is just one of many features implants should have. The first workshop covered how to do that, and this workshop will cover how to enumerate processes and modules that could be loaded in them.