SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Join me in this talk where we will utilize an AI Chatbot to aid us in vulnerability discover and exploitation.
In this webcast we will delve into the critical process of selecting a Governance, Risk, and Compliance (GRC) software tool that aligns with your organization's needs. In today's complex cybersecurity landscape, the ability to effectively track risks and communicate them to business stakeholder s is essential for informed decision-making and strategic growth.
Learn how to enhance your cloud security posture through actionable insights and use cases involving Microsoft Defender for Cloud.
The landscape of Security Operations is changing rapidly, and automation is leading the charge. In the second episode of the “Purple Team Power Hour”, we’ll explore how security teams are moving beyond static, pre-built playbooks toward dynamic, AI-driven solutions that can adapt to evolving threats in real time.
Manual processes in security operations are no longer sufficient to keep pace with emerging threats and increasing workloads. This talk explores the journey of fostering a culture of automation within a security operations team to enhance efficiency, accuracy, and improve analyst job satisfaction.
Cybersecurity is not just about protecting data—it’s about building and maintaining trust. As a Chief Information Security Officer (CISO), the responsibility to foster trust goes beyond technical expertise; it requires a strategic approach to communication, transparency, and organizational alignment.
With the proliferation of multi-factor authentication, penetration testers need to apply existing tooling to manipulate even internal applications.
Improving Windows Event Log Analysis with Yamato Security Tools presented by SANS Certified Instructor Zachary Mathis and Top Five Cloud Security Trends and Tips with SANS Professor Frank Kim.
Annual penetration testing is no longer enough to keep pace with modern threats.
Teaser
Teaser
Moving business critical workloads into public cloud and Kubernetes environments makes continuous monitoring and observability more crucial than ever.