SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Dive into the intricacies of Portable Executable (PE) parsing in this presentation showcasing the usefulness of the PE Parsing with WinDbg cheat sheet.
This webcast, led by James Tarala, Senior Faculty at the SANS Institute and Managing Partner at Cyverity, is designed to empower small businesses with the knowledge and resources they need to effectively manage cybersecurity risks without breaking the bank.
Discover the covert world of wireless network exploitation in our webcast on the "Nearest Neighbor Attack," as recently detailed by Volexity.
Join SANS for a special webcast introducing and demonstrating role-based trainings for targeted user groups. SANS experts will provide an overview of training packages designed specifically for staff with key roles in securing organizational data. This training will also help your organization comply with various data security mandates.
The classic way to make a massive difference with technology, or “Dent in The Universe,” is via a startup. We can define a startup as a company with high growth possibilities that is innovative and potentially disruptive. This describes most startups in the infosec space. Also, essentially every startup has a strong technology component today and infosec concerns. This translates to lots of startup opportunities for infosec professionals, whether as a founder, early-stage employee, rank and file employee, or even investor. In this talk we’ll discuss startups, including how important having a “great idea” may or may not be, funding options, as well as “exit” strategies. Funding options include bootstrapping, which means using existing resources, starting a business without external help or capital. Angel investors, affluent individuals who provide capital for a startup, are another option, as are venture capitalists, and crowd sourcing. An exit strategy is how illiquid assets like company ownership and stock are changed into liquid assets like cash. Even if you do not plan on exiting the company, you may want to convert some assets to cash. And of course any investors will want their money back with profits at some point. If you are focused on outcomes instead of inputs, a startup can be absolutely fantastic. If you are happy hacking more than just technology, but also happy to figure out and execute business concerns, such as hacking procedures and whatever it takes to make things work, a startup is an option to consider.
Get ready to deep dive into the all-new SANS SEC587 Advanced Open-Source Intelligence course, where 20 new labs and enhanced content redefine the landscape of OSINT training. This overhaul includes content on Russian and Chinese OSINT, cutting-edge audio analysis powered by AI, and timely new sections on cryptocurrency and drone detection, among others.
Join Lenny Zeltser, a Faculty Fellow at SANS Institute, to learn how to excel in the field of malware analysis. This webcast is designed for aspiring analysts, incident responders, and general cybersecurity professionals wondering about the process of examining malicious software. Lenny will break down the key stages of the malware analysis process, helping you identify your current capabilities and chart a path forward.
SANS Institute のFaculty Fellowである Lenny Zeltser と一緒に、マルウェア解析の分野で卓越する方法を学びましょう。このWebcastは、アナリストになりたい方、インシデント対応担当者、および悪意のあるソフトウェアを調査するプロセスについて疑問を抱いている一般的なサイバーセキュリティ専門家を対象としています。Lennyは、マルウェア解析プロセスの主要な段階を説明し、現在の能力を確認し、前進するための道筋を描くお手伝いをします。
Join us for the grand finale of the Holiday Hack Challenge 2024 where we’ll reveal the names of the big winners as we bid farewell to another chapter of challenges, victories, and innovation!
In this workshop, SANS instructor and lead author of SEC565: Red Team Operations and Adversary Emulation, Jean-Francois Maes, will walk the audience through a guided hands-on workshop where common Active Directory Privilege Escalation Attacks are going to be discussed and executed using Empire version 5.
SIEM's complicated evolution has resulted in unsustainable cost increases, scope creep, and the occasional declaration that the product space is essentially dead. Thanks to deep expertise in search and data management, access to OSINT and frontline intelligence, and AI-infused features, Google SecOps demonstrates that the SIEM still has plenty of gas in the tank. Discover how SecOps is ushering in the "SIEM's Third Act" by addressing the limitations of traditional SIEMs and empowering security teams with cutting-edge tools for threat-informed defense.
Cloud enthusiasts often tout how using a public cloud service provider helps mitigate ransomware attacks. Unfortunately, this is not true by default. Regardless of where files are stored, an attacker can download them, make them inaccessible to the target organization, and demand a payment for restoring their mission-critical data.