SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
People often believe that Linux is a “secure” operating system or that they “don’t have much Linux” in their environment, so they “don’t need to worry about it.”
Are you feeling the pressure to do more with less—juggling tool sprawl, alert fatigue, and increasingly sophisticated attacks? Security automation and AI-driven decision support can help streamline operations, enhance accuracy, and accelerate response times.
Join Greg Scheidel as he demystifies the technical foundation of Zero Trust Architecture (ZTA) and outlines the key technologies that drive modern, mature implementations.
From the U.S. government's 72-hour capture mandate to the EU’s NIS2 Directive, organizations are facing mounting pressure to implement full packet capture to meet emerging compliance obligations. What began as simple log retention requirements has evolved into a complex global web of regulations demanding forensic-grade network visibility.
The classic way to make a massive difference with technology, or “Dent in The Universe,” is via a startup. We can define a startup as a company with high growth possibilities that is innovative and potentially disruptive. This describes most startups in the infosec space. In this talk we’ll discuss startups, including how important having a “great idea” may or may not be, funding options, as well as “exit” strategies.
As cyber threats become increasingly advanced and persistent, traditional perimeter-based defenses are no longer sufficient to protect critical infrastructure.
Discover how to install and run attacker tools to hunt vulnerabilities in your environment before the pentesters (or attackers!) do.
Prepare for the Next Era of Cloud Security
Cloud adoption continues to grow, and with it, the complexity of securing multiple cloud environments. The SANS 2025 Multicloud Survey will explore how organizations manage security at scale across diverse cloud service providers. This webcast aims to provide insights into survey results, including the tools, techniques, and strategies needed to secure multicloud environments effectively—offering valuable guidance for organizations navigating the complexities of cloud security at scale.
Watch
This talk explores the growing threat of illicit crypto mining within enterprise networks.
Water and electric utilities form the backbone of our critical infrastructure, yet they are increasingly targeted by sophisticated cyber attacks aiming to disrupt essential services and threaten public safety. This free virtual event brings together cybersecurity professionals, utility operators, government stakeholders, and industry experts to explore the unique challenges and emerging threats facing the energy and water sectors. Participants will gain insights into recent attack trends, vulnerabilities in operational technology (OT) environments, and practical approaches to strengthening cyber resilience across interconnected systems.