SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Join SANS instructor Jonathan Reiter for this webcast covering his newly published poster, Comprehensive Kernel Debugging for Windows Developers.
Join us for this insightful webinar tailored to CISOs and security leaders looking to build and enhance a strong security culture within their organizations. In today’s evolving threat landscape, fostering a robust security culture is essential to protect business assets and maintain customer trust. This session will provide three practical steps to align your cybersecurity strategy with your organization’s mission, vision, and values. When this is in place, you can create a culture that sees security as a business enabler and not just a cost center.
Join Dr. Bilyana Lilly, Author of Russian Information Warfare, as she deciphers the intricate connection between geopolitics and cyber operations. This keynote will offer deep insights into how national security policies shape cyber warfare strategies, real-world case studies on state-sponsored attacks targeting critical U.S. organizations, and actionable intelligence on what security leaders can do to defend against nation-state threats.
Change—both planned and unplanned—is one of the biggest risk factors in industrial operations. Without a structured approach, even minor changes can introduce vulnerabilities that threaten safety, reliability, and resilience.
This presentation delves into the intricate process of generating a Software Bill of Materials (SBOM) for the Bob the Minions WiFi router by Davolink—a device whose firmware isn't publicly available. This session aims to provide attendees with practical insights into overcoming SBOM generation challenges in the IoT domain through hands-on hardware hacking, and leveraging the firmware and SBOMs for vulnerability discovery, as well as security improvement.
Drawing inspiration from "The Matrix," this talk challenges the conventional belief that you're in control. Imagine your IR plans as the blue pill, offering a false sense of security. Choose the red pill, and Steve will guide you through Wonderland, exposing the intricacies missing from your strategies.
When it comes to threat detection on Business Email Compromise (BEC) in Microsoft 365, a new engineer can quickly become overwhelmed- which log sources contain the events I need?
Join us for SANS Secure Your Fortress: Building Robust and Resilient Defenses for 2025, where cutting-edge techniques meet hands-on practicality. Designed for cybersecurity professionals at all levels, this event equips you with the tools, strategies, and insights needed to overcome today’s toughest challenges and prepare for tomorrow’s emerging threats.
The Cloud Native Computing Foundation (CNCF) 2024: The Top Data Trends Driving the Future of the Enterprise report estimates that 80% of new and refactored applications are being built to run on cloud native platforms, with Kubernetes powering the infrastructure.
In this webcast, Justin Searle—SANS Senior Instructor and author of the ICS410: ICS/SCADA Security Essentials™ course—shares practical configurations that can revolutionize your defensible architecture and strengthen your security posture.
Getting Involved in a Startup: Make a Dent in The Universe
SANS Chicago Spring 2025: SANS@Night - AI Realities: Why am I in a Handbasket?