SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Security operations centers face relentless pressure to detect and respond to threats around the clock—often with limited staffing and growing alert fatigue. In this 30-minute webcast, SANS Certified Instructor Mark Jeanmougin will examine how Dropzone AI can integrate into existing security stacks, support analyst development, and help SOC teams stay focused on high-impact decisions.
By now you have learned how to travel through time using Time Travel Debugging. TTD is such a powerful feature and you’ve only begun to scratch the surface of its use cases.
Attendees of this talk will learn about what vectors are, how they work, and why they're the building block of all AI systems. Armed with this knowledge you'll be better able to better use AI systems, and call out vendor snake oil!
A strong mission and vision provide security teams with clarity, direction, and purpose-but too often, they are overlooked or overly complicated. The good news? You don't need weeks of brainstorming to create a powerful, actionable mission and vision for your security team. Whether leading a new security team or refining an existing strategy, this session will provide a practical, repeatable framework to define and implement your team's mission and vision in an hour or less.
As software and hardware supply chains grow more complex and globally interconnected, they have also become prime targets for attackers.
Environments that leverage Industrial Control Systems (ICS) or Operational Technology (OT) infrastructure are not impervious to data attacks or breaches that contaminate data sources. In industrial systems, system and data integrity are inherently connected to process safety, with the potential to impact human life and the environment directly.
In this presentation, James Tarala, Senior Faculty at the SANS Institute and Principal Consultant at Cyverity, will introduce an automated cybersecurity risk management model that integrates data analytics with existing security infrastructures.
Join SANS for a special webcast introducing and demonstrating the New SANS Skills Quest powered By NetWars. SANS experts will provide an overview of this new and improved set of online range challenges that organizations can use to support continuous knowledge and skill development.
Open Source Intelligence plays a critical role in malware analysis, especially in understanding the broader context of the attack, enriching findings, and speeding up attribution. In this talks, we will cover many examples about useful information found in malware samples, how to access them and enrich them. I promise, no assembly!
In 2025, the SANS SOC Survey will extend its detailed inspection of cybersecurity operations centers. By exploring the capabilities and outsourcing; architectures and cloud use; technologies; hiring and staffing; metrics and funding; threat intel; and automation we develop a global picture of the state of SOCs.
Industrial environments are different—and so is the approach required to assess them safely and effectively.
Connected devices are transforming business operations — from streamlined workflows to increased automation and convenience. But with this growing connectivity comes increased exposure to cyber threats. Every unsecured device is a potential entry point for attackers, putting your operations, data, and reputation at risk.