SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
In the age of artificial intelligence (AI) and ever-evolving cyber threats, the landscape of security operations has witnessed a transformative shift. Our 2024 Detection & Response Survey delves into how organizations address critical aspects of detection, response, and the integration of these vital functions within organizations. On this webcast, SANS Certified Instructor Josh Lemon will provide insights into the prevalence of organizations maintaining separate detection and response teams, shedding light on the reasons behind such decisions and their implications for overall security posture. Register for this webcast now, and you will automatically receive the companion white paper upon publication.
This talk will cover persistence mechanisms specific to the AWS ecosystem. The audience will learn about well established persistence techniques but also about creative new mechanisms that rely on newer cloud services. Most importantly it will cover defensive techniques and focus on the bottlenecks defenders can monitor to detect this activity.
Ever wondered how the SANS Internet Storm Center will help you protect your network? This talk will not use power points but instead offer an engaging walk through recent events, how they manifested themselves in the ISC's data, how our different data feeds work, and more.
This webcast will provide a detailed overview of the products and pricing offered through the SANS SLTT Government partnership program.
Part 2: Secure by Design: Elevating Security Beyond DefaultsIn Part 2 of this series, we focus on how Secure by Design (SbD) shifts development approaches to integrate security from the ground up, reducing risks early and creating systems that are resilient and secure by default.
Part 3: Modernizing Identity: Navigating Challenges and Embracing Cloud SolutionsIn Part 3, we tackle the pressing need for identity modernization as organizations transition from legacy systems to cloud-based applications. As outdated protocols and misconfigurations become more prevalent, this webcast will explore the benefits of modern identity solutions and their role in enhancing security through conditional access and zero trust principles.
Hear ye! Hear ye! Be ye free from the CRT! What’s life like anyway without the CRT? What can a program even do without it? As the entire series comes to a close, this part will explore the CRT and how to become independent from it. This independence is critical to understand when it comes to creating binaries that are compiled as PIC; Position Independent Code.
In the age of artificial intelligence (AI) and ever-evolving cyber threats, the landscape of security operations has witnessed a transformative shift. Our 2024 Detection & Response Survey delves into how organizations address critical aspects of detection, response, and the integration of these vital functions within organizations. On this webcast, SANS Certified Instructor Josh Lemon will provide insights into the prevalence of organizations maintaining separate detection and response teams, shedding light on the reasons behind such decisions and their implications for overall security posture.
En esta presentación Jess García proporciona un análisis en profundidad acerca del potencial transformador que tienen los sistemas de AI Generativa para potenciar las capacidades de detección de amenazas y de los equipos de respuesta.
Modern security leaders must deal with an endless barrage of changes to the business, technology, and threat landscape.
Splunkはマシンデータ分析基盤として確固たる地位を築いています。情報セキュリティ分野でも、Splunkを活用している組織は少なくありません。シンプルなインターフェースで、Google感覚で使っても一定のサーチが遂行できるのは、すばらしいことです。
Part 4: Evolving Cloud Security with a Modern ApproachIn this session, we'll explore how organizations can adapt their security practices to fit the dynamic nature of cloud infrastructure. While the cloud isn't inherently insecure, traditional on-premises security techniques often fall short. We'll dive into the shared responsibility model between cloud providers and users, the advantages of cloud-native security controls, and how AI tools can aid automation and threat detection-without losing sight of the critical role of human analysts.