SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsCollects and preserves digital evidence using documented techniques to support analytical and investigative objectives in cyber operations.
Perform forensic analysis on digital artifacts, ensuring evidence integrity through rigorous chain-of-custody protocols. Utilize specialized investigative methods and meticulous documentation to support legal actions against cybercriminal activities.
Locate and securely collect digital evidence ensuring integrity through strict chain-of-custody procedures.
Conduct forensic analysis on cybercrime artifacts using precise analytical methods and specialized investigative tools.
Document investigative processes meticulously, maintaining clear, accurate records for legal proceedings and reporting.
Explore the courses below that are aligned with this job role.
Essentials courses are designed for individuals with a foundational understanding of IT or cybersecurity concepts.
Develops and evaluates cyber training content and methods to ensure relevance, effectiveness, and alignment with organizational needs.
Explore learning pathLeads privacy program development and compliance oversight to ensure adherence to privacy laws, standards, and executive data protection needs.
Explore learning pathOversees a portfolio of IT capabilities aligned to enterprise goals, prioritizing needs, solutions, and value delivery to the organization.
Explore learning pathInvestigates cybercrimes, analyzing digital media and logs to establish documentary or physical evidence in support of cyber intrusion cases.
Explore learning pathManages support resources and readiness for system components, ensuring operational capability through lifecycle logistics and maintenance.
Explore learning pathCreates cyberspace strategies and policies that align with mission objectives and support organizational readiness and future initiatives.
Explore learning pathSets direction and policies for cyber operations, assumes risk decisions, and aligns mission objectives with available cyber resources.
Explore learning pathLeads IT project management to deliver services or products, ensuring milestones, budgets, and mission alignment are successfully achieved.
Explore learning pathThere are numerous different roles in cybersecurity and where you fit depends on your interest level. SANS New to Cyber offers courses, certifications, and free resources for anyone interested in getting started in cybersecurity.
Explore New to Cyber