SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Organizations spend a large amount of effort to lock down their technology and the associated process to prevent intrusions into their organization, but many times breaches end up happening due to the human factor.
Join us for our upcoming webcast as we explore why now is the perfect time to launch your career in cybersecurity.
This talk will cover the fundamentals of writing asynchronous code using Python. It will include common keywords such as async and await, as well as cover usages of the asyncio standard library. The talk will demonstrate these by extending the malware written in Day5 of SEC573 to use an asynchronous approach.
As demonstrated in the last workshop in the Aviata Cloud series, public cloud resources pose a major risk. One mitigation, Private Endpoints, allows users and workloads to connect to cloud services without internet access.
Come learn the outcomes of the 2024 SANS | GIAC Cyber Workforce Research Report which is based on a first-of-its-kind survey that analyzed the cybersecurity workforce with the goal of identifying the key factors to successfully build high-performing cybersecurity teams.
We are confronted by so many cyber threat actors, with the primary focus being on external threats, and when it comes to internal threats, the focus is often on internal negligence. But the reality is we are seeing in more and more cases that external threat actors are actually simply corrupting internal staff members, often in trusted IT and security positions, to overcome even the most sophisticated cyber security systems.
In the past year, cyber threats are once again top of mind for organizations of all types. The global geopolitical situation continues to become more unstable, leading to increased conflicts and hybrid threats. As a result, cyber threat intelligence (CTI) professionals face significant challenges in managing the evolving threat landscape and providing actionable intelligence to their stakeholders. On this webcast, SANS Certified Instructor Rebekah Brown and Instructor Candidate Andreas Sfakianakis will explore 2024 CTI Survey results to learn:How the CTI discipline has evolved in the past yearHow CTI analysts kept up with the ever-changing threat landscapeHow CTI analysts view emerging threats, such as adversary use of AIHow technology enablement improves the efficiency of CTI teamsRegister for this webcast now, and you will automatically receive the companion white paper upon publication.
Are you struggling to get both your leadership and workforce to buy into cybersecurity? Do you feel overwhelmed and need to scale the impact of your security team? Learn how to engage and transform your organization into the biggest believers and supporters of cybersecurity by institutionalizing a strong security culture. • What is a strong security culture and how it helps you • Indicators of a strong security culture • Top three drivers of a strong security culture • Key models and how to build the culture you want, to include Curse of Knowledge, Golden Circle and ADKAR change model. • The most common mistakes security teams and leaders make • How to measure and quantify your security culture
Step into the forefront of manufacturing resilience as we navigate today’s cybersecurity challenges. This dialogue with Matt Cowell, VP of Business Development at Dragos, and Kamil Karmali, Senior Global Manager for Cybersecurity Consulting Services at Rockwell Automation, is dedicated to the shifting tides in cyber threats that manufacturers face, strategizing against the escalation of digital risks, and charting a progressive course of action towards OT/ICS cybersecurity outcomes.
近年、セキュリティ情報およびイベント管理(SIEM)ソリューションの状況は著しい変貌を遂げている。SIEMプラットフォームは、もはや単なるデータリポジトリにとどまらず、貴重な洞察に満ちたダイナミックなハブへと進化しています。
In recent times, the landscape of Security Information and Event Management (SIEM) solutions has experienced a remarkable metamorphosis. No longer confined to being mere data repositories, SIEM platforms have evolved into dynamic hubs brimming with invaluable insights. Join us in this webcast as we embark on a journey through the contemporary realm of SIEM, spotlighting its departure from traditional methodologies, shifting to the cloud, and its embrace of cutting-edge technologies like Artificial Intelligence (AI) and machine learning. We'll navigate through the symbiotic relationship SIEM shares with other important capabilities such as Extended Detection and Response (XDR), identity and access management (IAM), and the renowned MITRE ATT&CK framework. By doing so, we'll unravel the indispensable role SIEM plays in orchestrating holistic security strategies that safeguard against a myriad of threats.
In this webcast, join the authors of SEC549: Cloud Security Architecture to explore the push and pull logging architecture used by Microsoft Sentinel to ingest cross-cloud audit logs. Attendees will see the log journey from both AWS CloudTrail and Google Cloud Audit Logs into Microsoft Sentinel and learn some fun Kusto Query Language (KQL) queries to investigate cloud events.