SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Microsegmentation is hard to achieve via ongoing network monitoring. How do you effectively microsegment hosts and enforce authentication mechanisms while limiting user impact?
The NIST cybersecurity framework (CSF) is a well-known and respected framework for buildingcybersecurity programs. The NIST CSF organizes the framework beginning with functions that organizebasic cybersecurity activities at their highest level. These functions are Identify, Protect, Detect, Respondand Recover. The NIST CSF functions can help cloud organizations express their management ofcybersecurity risk by organizing information, enabling risk management decisions, addressing threats,and improving by learning from previous activities.
X may have given it to the free Twitter API but there are still A LOT of data sources out there that we can monitor for free and fire alerts when things meet our criteria.
In the modern age of cloud migration and deployment, many security and operations teams are having to adapt their controls, processes, and overall strategies to better accommodate hybrid on-premises and cloud environments. While some architecture and control concepts stay relatively static, many don't.
How does an organization’s external attack surface impact its offensive security initiatives? In our experience, a comprehensive understanding of this attack surface can help better emulate real-world attack scenarios and reduce threat exposure. In this webcast, we’ll explore the results of our survey that was designed to understand how knowledge of an organization’s external attack surface can help its security team evaluate risk and prioritize security actions.Register for this webcast now and be among the first to receive the accompanying white paper from SANS Certified Instructor Matt Bromiley and SANS Principal Instructor Chris Dale.
Take part in the UK University CTF Tournament on the 18th – 20th October 2023.
Gartner’s recent report on Application Security Posture Management (ASPM) includes a projected 40% adoption rate by 2023. But what’s so transformative about ASPM and what does it mean for you?
Whether you are just getting started in cloud security, or overseeing a team of technical cloud practitioners, you likely have questions about the process, journey, technology, and career path of cloud security professionals.
Industrial control system (ICS) security represents one of the more challenging areas for security professionals. The typical ICS is complex and interconnected. It’s often a legacy system that wasn’t designed with security in mind and, because it’s different from traditional IT assets, it has very different security requirements. And no surprise—such systems are increasingly targeted by sophisticated cyberattackers, including ransomware gangs and nation-state actors.
Being able to investigate suspicious websites is a key skill for investigators and threat intelligence professionals.
開発者は、利用者が求める様々な機能を備えた素晴らしいソフトウェアを作成するために日夜働いています。機能性と開発スピードが最優先され、セキュリティはアプリケーションセキュリティチームが責任を負うケースがよく見受けられます.
Developers work hard to make amazing software, with lots of features that people like. Functionality and speed are their priority, with security seen as the responsibility of the AppSec team.