SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
During offensive operations engagements, We often find ourselves repeating the same playbooks over and over again, getting success every time. Are we actually becoming better as an industry in improving security posture? Attend the talk to find out! Warning: Rants inside!
This webcast will provide a detailed overview of all the products and pricing offered to accredited educational institutions, in the US and Canada through the SANS Educational Institutions Summer Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
Implementing cloud security controls is hard. Implementing them at scale is harder.
Following up on part 1 of the series, you now have your basics of WinDbg down. You jump into your first debugging session, stepping over code you do not want to inspect, just to realize that the function you just stepped over was actually important. You restart the debugging session and go again. If only it was possible to go back in time...
Detecting and responding to cloud attacks has never been more challenging. Modern attacks and the ever-changing nature of cloud infrastructure and applications make security teams’ lives more difficult than ever. A new approach is needed – one that can provide a fully traceable & explainable runtime security story spanning the entire cloud technologies stack.
Join cybersecurity leader Mark Orlando and researcher and consultant Dr. Daniel Shore as they share strategies for recognizing and mitigating burnout.
This webcast will provide a detailed overview of all the products and pricing offered to qualified state, provincial and local government organizations, in the US and Canada through the SANS SLTT Government’s Aggregate Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
Join us for the Ransomware Summit Solutions Track 2025 to explore the full spectrum of ransomware dynamics. Learn how threat actors are adapting their strategies, where vulnerabilities still exist, and why the cycle of paying ransoms endures.
With the proliferation of multi-factor authentication, penetration testers need to apply existing tooling to manipulate even internal applications. Building attack infrastructure internally during a penetration test is resource exhausting, but modern tools like evilginx can do most of the heavy lifting for us.
The first training module for the energy sector provides an overview of the elements of an ICS Specific Incident Response Plan, how it differs from astandard IT Incident Response Plan, and how to prepare your team to respond. Simulate an incident response to a remote cyber intrusion into a drilling rig’s control system network to access programmable logic controllers (PLCs) to validate industrial network visibility of the rig control system’s threat.
This 5th and final control involves understanding which cyber digital controls are deployed and what device operating conditions aid in risk-based vulnerability management decisions to patch vulnerabilities. This enables appropriate safety-informed mitigations to the impact and monitoring for possible attack exploitation internal to the control network.
Nearly 40% of ICS environment compromises come from the IT business network that allows a threat into the ICS environment. So, it’s more important to focus on the ICS perimeter defenses first, followed closely by the additional required segmentation within the ICS network itself. This control involves ICS-aware network architectures that support effective segmentation, visibility of control system traffic for analysis, log collection, asset identification, industrial DMZs, and enforcement for process communication integrity and reliability.