SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsVincent Stoffer is the Field Chief Technology Officer at Corelight, the company founded by the creators of the Zeek (Bro) Network Security Monitor. Vince brings the sales, success, research, and engineering teams together to deliver world-class security products to Corelight customers. Vince previously held security engineering and network management positions at Lawrence Berkeley National Laboratory and Reed College. He attended Pitzer College in Claremont, CA, graduated with a BA in Humanities from University of Oregon, and he holds the CISSP, GCIH and GCIA certifications.
Explore content featuring this instructor’s insights and expertise.
Since 2017, the SANS ICS/OT Cybersecurity Survey has been a foundational benchmark for critical infrastructure asset owners and operators. On this webcast, SANS Certified Instructor Jason Christopher explores the growing trends in cyber threats, vulnerabilities, and risks across industrial environments, including actionable recommendations for how organizations can improve their security posture. As global incidents—and regulations—continue to focus on ICS/OT cybersecurity, it is vital that actionable information and benchmarks are provided to defenders working in this challenging field as they evaluate their ongoing efforts in 2024. Register for this webcast now, and you will automatically receive the companion white paper upon publication.
Join us for the Ransomware Summit Solutions Track 2025 to explore the full spectrum of ransomware dynamics. Learn how threat actors are adapting their strategies, where vulnerabilities still exist, and why the cycle of paying ransoms endures.