SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
워크로드가 클라우드로 이전될 때, 이벤트 데이터(관리 이벤트)는 새로운 형식을 취하게 됩니다. 보안팀은 잠재적 위협을 발견하기 위해 데이터를 식별, 저장, 처리할 필요가 있습니다. 이번 웹케스트에서는 클라우드 환경에서 관리 평면(Management Plane) 이벤트들의 전체 가용 주기를 단계별로 살펴보는 것으로 시작합니다.
As threat data continues to amass, security operations has to work harder and faster to keep up with the growing number of threats. To gain the advantage over adversaries, it is essential for security operations to narrow their focus and streamline threat detection and response efforts. In this product review webcast, SANS Analyst Dave Shackleford explores ThreatQ, a platform designed to help teams process and refine data into intelligence, enabling them to focus on the indicators most relevant to their infrastructure and build a tactical response strategy.
In this CloudSecNext 2022 session of Cyber42 Vulnerability Management you will play to win! In this 90-minute game day you will play individually to improve the state of a fictional organization and more effectively handle the vulnerability management.
Join this SANS Cloud Security Solutions Summit as we explore various cloud security topics through invited speakers while showcasing today's current capabilities. Presentations will focus on technical case studies and thought leadership using specific examples relevant to helping companies improve the security of their cloud environment through automation.
ในการบรรยายนี้ Nico Dekens จะแนะนำขั้นตอนการตรวจสอบข้อมูล online ที่บิดเบือน และเทคนิคการตรวจสอบและยืนยันข้อมูลใน OSINT (Open-Source Intelligence)
In this talk Nico Dekens will step through the prolific disinformation propagating online and develop techniques for validation & verification in the OSINT environment.
This webcast will provide a detailed overview of all the products and pricing offered to qualified state, provincial and local government organizations, in the US and Canada through the SANS / CIS partnership program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
Can your NDR solution protect you from zero-day threats before you become the next headline? This discussion will explore the salient requirements for NDR and other approaches as critical cybersecurity technologies. Investments in NDR, SIEM, EDR, and perimeter prevention alone are not enough to stop modern-day cyber-attacks. These tools lack network context, a fundamental requirement for achieving cybersecurity. NDR bolsters every phase of a SOC's maturity and an organization's maturity model. That said, not all NDR is created equal. This discussion will expose the characteristics of Advanced NDR that are most important to your cybersecurity operations.
Join SANS Purple Team courses author and Senior Instructor, Erik Van Buggenhout, and SANS Purple Team Ambassador and Principal Instructor, Jorge Orchilles, as they walk you through the new, innovative, and interactive Purple Team Poster.
This presentation will explore the differences between how digital forensics is used when applied towards a forensic science goal, or a forensic engineering goal, in incident response.
New to the ICS/OT security area? Are you an IT Security Manager stepping over to take on responsibilities to secure critical infrastructure? Maybe you’re in an engineering role taking a more focused approach to cyber security and practical cyber defense. Or perhaps you have IT security knowledge and are looking to explore OT security.
Join us for Cyber42 on the hot topic of ransomware. This version of the game represents how a fictional organization responds to a ransomware event against the organization. Responses to ransomware events require not only managing the event but also the expectations of key stakeholders and external parties.