SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
Apply what you learn with hands-on exercises and labs
Integrate strategic and tactical approaches to level up enterprise vulnerability management programs while addressing infrastructure and cloud environment challenges.
Excellent labs. More fun than I thought possible with vulnerability management.
This course equips security professionals with proven strategies to mature vulnerability management programs and transition from merely identifying vulnerabilities to successfully treating them. Using the Prepare, Identify, Analyze, Communicate, and Treat (PIACT) Model, you'll learn to think strategically about vulnerability management while receiving practical guidance to overcome common challenges. The course addresses the complexities of managing vulnerabilities across traditional infrastructure, applications, and cloud environments.
Through 16 hands-on exercises and the Cyber42 leadership simulation game, you'll develop both strategic thinking and tactical skills to prioritize unblocked vulnerabilities, communicate risk effectively, and implement remediation techniques that work. This vulnerability management training course helps security professionals adapt their practices as organizations adopt cloud services and implement DevOps methodologies.
David has 20+ years of experience in vulnerability management, application security, and DevOps. He's developed technical security training initiatives, and believes vulnerability management is one of the most important foundations of cybersecurity.
Read more about David HazarWith a career spanning 20+ years and has included working in-network design, IP telephony, service development, security and project management, Jonathan has a deep technical background that provides a wealth of knowledge he draws upon when teaching.
Read more about Jonathan RistoExplore the course syllabus below to view the full range of topics covered in LDR516: Building and Leading Vulnerability Management Programs.
This section examines the importance of vulnerability management and introduces cloud service impacts. You'll explore asset management as a foundation for effective vulnerability management and learn how contextual information enhances program success.
This section addresses identification challenges and architectural design across infrastructure and applications. You'll learn about scanning strategies, permission management, and responsible disclosure practices to enhance vulnerability detection capabilities.
This section teaches techniques to analyze vulnerability data, reduce inaccuracies, and identify root causes. You'll learn prioritization strategies, develop meaningful metrics, and create targeted reports to drive remediation action.
This section explores remediation processes, technologies, and integration with change management. You'll examine cloud challenges, application vulnerability remediation, and alternative treatments when traditional methods aren't viable.
This section synthesizes course learnings and focuses on program enhancement. You'll discover strategies to make vulnerability management engaging, identify key stakeholders, and build mature vulnerability management programs.
Operate from the point of view of an adversary in order to protect you most sensitive assets.
Explore learning pathDaily focus is on the leadership of technical teams. Includes titles such as Technical Director, Manager, and Team Lead.
Explore learning pathWhen purchasing a live, instructor-led course, add 4 months of online access. View price in the info icons below.
Add 6 months of hands-on skills practice. Add to your cart when purchasing your course.
It is excellent for people who are creating and implementing their VMP. The course is detailed, thorough, and sets clear expectations for a successful program.
Great class full of new info for beginners and experienced VM folks. Thank you!
I have really enjoyed the discussions around these labs and hearing similarities from other users. I think this format for labs is fun.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources