SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
This webcast will provide a detailed overview of all the products and pricing offered to accredited educational institutions, in the US and Canada through the SANS / REN-ISAC partnership program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
With organizations and individuals increasingly moving to the cloud, the need for secure and agile deployment pipelines is more important than ever. This session explores how to achieve this goal by strategically placing security controls throughout the different phases of the DevOps process. Topics covered include the DevOps toolchain, security tools, and techniques for injecting security controls into automated pipelines.
This webcast will provide a detailed overview of all the products and pricing offered to qualified state, provincial and local government organizations, in the US and Canada through the SANS / CIS partnership program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
In today’s cybersecurity landscape, zero-day vulnerabilities pose significant threats to software applications, and their discovery is crucial for effective mitigations. Join us in this webinar as we will share our journey in uncovering vulnerabilities in Adobe Acrobat and Foxit PDF Editor, the two most widely used PDF processing applications.
The constant and uncharted way in which workloads and cloud services are provisioned creates an expanding and dynamic attack surface that is hard to secure with tools and processes designed for legacy data centers. Bad actors are adapting to this new landscape and taking advantage of the growing vulnerabilities and security weaknesses. The cloud necessitates a significant overhaul of many tools, services, processes, and skills that security operations teams have relied upon for
Pivoting, tunneling, and redirection are essential skills that separate the junior and senior operators in the offensive security landscape. This workshop describes various techniques used to creatively route traffic through multiple network segments.
Use the newest tool to self-assess your organization's vulnerability management maturity, built on the renowned SANS Vulnerability Management Maturity Model (VMMM).
Industrial control systems (ICS) are critical to the operation of many essential services, including power grids, water treatment plants, and transportation systems. These systems are often connected to the enterprise, which opens the door for potential cyber-attacks. In ICS environments, access equals control, with exposed remote services being one of the most common attack vectors. Remote services are software applications that allow users to connect to an ICS from a remote location. These services can be used for various purposes, such as troubleshooting, maintenance, and updates. However, if these services are not properly understood or secured, they can be used by attackers to gain unauthorized access to ICS systems. In this presentation we will explore with the audience a deeper understanding of the attack surface challenge for industrial environments, how to identify remote services exposures, and recommendations on how to gain control of your remote logical access.
Hands-on Workshop: Work through the process of creating a detection that we can use as defenders to spot an adversary performing attack techniques against our Azure environments.
Topics for this Cyber Solutions Fest track include:* The principles of zero trust architecture and best practices.* How organizations are approaching zero trust implementations, given modern enterprise complexities.* The role of advanced technology, like AI and ML in zero trust.* Real-world case studies and analysis of the challenges and opportunities of implementing a zero trust architecture.Please join us on June 9th for the opportunity to learn from industry leaders and security experts to review the latest trends and capabilities of, and how your organization can benefit from, zero trust architecture. We hope to see you there!
This will be the first part in a series of workshops that introduce students to the C programming language, specifically for the Windows platform. The items discussed in this workshop series will serve as a prerequisite for those interested in taking the SEC670 course. This first part will cover basic items such as, setting up Visual Studio Community, creating a project, developing your first project, etc. We will then dive into C itself covering data types, the anatomy of a function, statements, variables, directives, and debugging.
In its sixth year, the SANS 2023 SOC Survey explored SOC capabilities, deployment architecture, technology use and satisfaction, capabilities outsourced and satisfaction with outsourced providers. With survey data from active SOC managers and analysts, this webcast will cover the escalating movement to the cloud, orchestration, and tool changes. It explores the developing promise of deception, AI and machine learning. Key topics will include capabilities that compromise a SOC such as; technology deployed and satisfaction; staff composition, hiring, and retention; and SOC budgets.Register for this webcast now and be among the first to receive this whitepaper from SANS author and Senior Instructor Christopher Crowley.