SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Adversaries are increasingly targeting multi-cloud infrastructures to disrupt operations and demand ransomware, exfiltrate sensitive data, and steal funds. To accomplish this while evading detection, they often adapt traditional Living-off-the-Land (LOTL) tactics to the specific API-driven characteristics of the cloud.
This is a 2-hour hands-on workshop. As with any enterprise environment, we can (and should) focus on hardening our defenses to keep the adversaries out, but these defenses may some day be evaded via a variety of methods. Cloud is no different.
Come learn from SEC staff on what you need to know about reporting and how to get your organization up to speed on the upcoming disclosure requirements. Some of the items covered include:
Without the right tools and processes in place, test planning and report creation can be a manual nightmare, taking pentesters' focus away from what they do best — hacking.
A lot of the traditional techniques we use for incident response, and digital forensics, are too slow when dealing with the challenges of scale and time in a modern intrusion.
Being able to find sensitive organizational information is a core skill for investigators and cyber security professionals alike. Red Teamers use it for reconnaissance, while Blue Team members need to be alert to the ways in which confidential data can leak through carelessness or misconfigurations.This talk will look at a range of techniques from beginner to more advanced level that will help you to find and exploit company data.
QUIC is a new transport protocol that is "quickly" being adopted across the internet. Application protocols like HTTP/3, SMB, and DNS are using QUIC today. How do your network, security, and middleware devices handle QUIC traffic? What are some of the security impacts to the QUIC protocol? In this talk, we're going to look at the QUIC protocol and the effect it is having on networks and security.
The evolution of cloud technologies has ushered in a new era of opportunities, but with it comes a unique set of challenges, particularly in the realms of configuration and network security. This talk will shed light on the modern practices and strategies essential for safeguarding cloud environments against configuration missteps and network vulnerabilities. We'll dissect real-world scenarios where configuration errors led to breaches and delve into network risks that are often overlooked. By exploring tools, protocols, and best practices, attendees will gain insights into fortifying their cloud infrastructures. Join us on this journey through the intricacies of cloud security, ensuring that your organization remains resilient in the face of ever-evolving threats.
Players will have to use their cybersecurity skills to venture by boat across the Geese Islands in the South Pacific Ocean, all the way to outer space where they will learn the Space Packet Protocol (SPP). To solve each challenge along the way, players will have to use AI tools – helping Santa and the elves as they grapple with their own new AI technology called ChatNPT (North Pole Technologies). This special November 29 Sneak Peek is a whole week before the 2023 game officially launches and opens for play. Come see what else is in store in this invite-only webcast – before anyone else – and get ready for the 2023 game to open for play the second week of December.
There are two cybersecurity truisms: You can’t prevent attacks you can’t detect; and attacks you can’t prevent turn into incidents you need to detect before you can respond to them.
This webcast will provide a detailed overview of all the products and pricing offered to accredited educational institutions, in the US and Canada through the SANS / REN-ISAC partnership program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
The Office of the DoD Chief Information Officer recently published two critical initiatives: the 2023-2027 DoD Cyber Workforce Strategy and DoD Manual 8140.03. The strategy establishes the direction for unified management of the cyber workforce and outlines a roadmap for its advancement while DoDM 8140 changes the way that we qualify our workforce. Through the DoD 8140 Cyber Workforce Qualification Program, DoD is expanding the qualification program to roughly 225,000 military, civilian, and contractor positions by establishing foundational and residential qualification criteria for each DoD Cyber Workforce Framework work role. Together, the strategy and program will enable the DoD to develop and deploy an agile, capable, and ready cyber workforce.