SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
During offensive operations engagements, We often find ourselves repeating the same playbooks over and over again, getting success every time. Are we actually becoming better as an industry in improving security posture? Attend the talk to find out! Warning: Rants inside!
This webcast will provide a detailed overview of all the products and pricing offered to accredited educational institutions, in the US and Canada through the SANS Educational Institutions Summer Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
Implementing cloud security controls is hard. Implementing them at scale is harder.
Following up on part 1 of the series, you now have your basics of WinDbg down. You jump into your first debugging session, stepping over code you do not want to inspect, just to realize that the function you just stepped over was actually important. You restart the debugging session and go again. If only it was possible to go back in time...
Detecting and responding to cloud attacks has never been more challenging. Modern attacks and the ever-changing nature of cloud infrastructure and applications make security teams’ lives more difficult than ever. A new approach is needed – one that can provide a fully traceable & explainable runtime security story spanning the entire cloud technologies stack.
Join cybersecurity leader Mark Orlando and researcher and consultant Dr. Daniel Shore as they share strategies for recognizing and mitigating burnout.
This webcast will provide a detailed overview of all the products and pricing offered to qualified state, provincial and local government organizations, in the US and Canada through the SANS SLTT Government’s Aggregate Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
With the proliferation of multi-factor authentication, penetration testers need to apply existing tooling to manipulate even internal applications. Building attack infrastructure internally during a penetration test is resource exhausting, but modern tools like evilginx can do most of the heavy lifting for us.
Join us for the Ransomware Summit Solutions Track 2025 to explore the full spectrum of ransomware dynamics. Learn how threat actors are adapting their strategies, where vulnerabilities still exist, and why the cycle of paying ransoms endures.
The first training module for the energy sector provides an overview of the elements of an ICS Specific Incident Response Plan, how it differs from astandard IT Incident Response Plan, and how to prepare your team to respond. Simulate an incident response to a remote cyber intrusion into a drilling rig’s control system network to access programmable logic controllers (PLCs) to validate industrial network visibility of the rig control system’s threat.
Module 3 of the training relates to continuous network security monitoringof the ICS networked environment, with protocol-aware tool sets andsystem-to system interaction analysis capabilities used to informengineering of potential risks to the control, view, and safety of operations.
This 4th control involves the identification and inventory of all remote access points and allowed destination environments, on-demand access and MFA authentication where possible, and jump host platforms to provide control and monitoring points within secure segments.