SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsAbhi is an engineer turned Product Marketing Manager who has worked across startups and Fortune 500 companies. He has worked across blockchain, cloud networking, and cybersecurity industries. He is always eager to talk to customers even if they don't want to talk to him. In another life, Abhi would like to be reborn as a feedback form but he is happy that in this life, his PMM role helps him do just that.
Explore content featuring this instructor’s insights and expertise.
The move to the cloud and increasing remote work have fragmented attack surfaces, making it easy for attackers to find unmanaged assets with critical exposures. Manually finding and remediating these risks is untenable, so security teams need active attack surface management to not just find the unknown exposures but also automatically fix them.
In its fifth year, SANS Cyber Solutions Fest aims to brings together an ensemble of security professionals, solution providers, gurus and experts ready to share knowledge about the latest developments and innovative technologies in the cybersecurity industry.Join the Attack Surface & Vulnerability Management Track to hear from chairperson Matt Bromiley and a host of leading cyber security experts as they walk through specific use cases and challenges with the goal of helping you understand why your attack surface is critical for identifying and mitigating potential vulnerabilities in your digital presence and protecting systems from adversaries.As part of this forum, we'll look at technologies and techniques to help you proactively fortify your defenses and profile your attack surface before the adversaries take advantage of it.Forum Highlights: Discover how industry leading technologies and techniques can assist you with fortifying your existing attack surface and vulnerability management policies in the workplace Learn from industry leaders as they dive into cutting-edge use case studies and specific examples, while highlighting how the integration of technologies can provide unprecedented insights and advantages Interact with SANS chair Matt Bromiley, speakers and peers in the interactive Slack workspace by posting questions and discussing the forum topic