SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsNicholas DiCola is a Security Jedi and the VP of Customers where he leads a global team. Before joining Zero Networks, Nicholas led the Cloud Security Customer Experience Engineering team helping customers unblock deployments and improving products. He was with the United States Marine Corps and retired as a Defensive Cyberspace Weapons Officer after 22 years of total service. He is a co-author of several books and holds many certifications such as CISSP and CEH.
Explore content featuring this instructor’s insights and expertise.
Lateral movement allows attackers to damage and steal information from an entire network once they gain access to one (usually the most vulnerable) entry point. Microsegmentation solves this problem by dividing a network into very small regions called microsegments, usually up to a segment per machine. However, if implemented incorrectly, it can be time-consuming, expensive, difficult to manage, and ineffective. Join Nicholas DiCola, VP of Customers at Zero Networks, and Aaron J. Goodwin, CISO at B. Riley Financial, as they share everything you need to know to effectively utilize microsegmentation for maximum network security and minimize the risk of attacks – including best practices, use cases, and the most easily deployable solutions to keep your organization safe.
Microsegmentation is hard to achieve via ongoing network monitoring. How do you effectively microsegment hosts and enforce authentication mechanisms while limiting user impact?