SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsCloud security encompasses technologies, policies, and controls that protect data, applications, and infrastructure in cloud environments. Knowing how to safeguard sensitive information in cloud environments is crucial for preventing cyber threats, ensuring compliance, and maintaining business continuity.
Cloud security is business-critical, requiring cyber professionals to navigate evolving threats, secure cloud environments, and align security goals with business objectives. At SANS, we believe that effective cloud security training should be a business enabler that evolves as fast as the technology. It must equip practitioners with hands-on technical expertise, in-depth knowledge of multiple Cloud Service Providers (CSPs), and strategic insight to build sustainable security practices in an era where innovation outpaces workforce knowledge.
Learn to build secure, resilient cloud environments and align security frameworks with business strategy.
Develop the ability to monitor, detect, and respond to cloud-specific threats and security breaches.
Gain expertise in regulatory compliance, governance, and risk mitigation for cloud environments.
SANS is a world leader in Cloud Security for a reason. I'm never disappointed when I attend sessions, and I know I'm in for a torrent of incredibly useful information.
Ahmed Abugharbia is a SANS Certified Instructor and founder of Cyberdojo, focusing on GenAI and Cloud Security. With over 17 years of experience in security, Ahmed has worked and led projects in cloud security, network and application security, as well as incident handling.
Learn moreSerge brings extensive technical expertise as founder/CEO of SpyderSec and President of Denver's OWASP chapter. With over 15 years' frontline experience, Borso delivers practical, implementable AWS security insights valued by global organizations.
Learn moreBrandon is an independent security consultant and SANS Senior Instructor. He is lead author for SEC510: Cloud Security Controls and Mitigations; GPCS holder #1, multi-year RSA Conference presenter, and cloud Bug Bounty collector.
Learn moreEric is a co-founder and principal security engineer at Puma Security focusing on modern static analysis product development and DevSecOps automation. He is co-author and instructor for three SANS Cloud Security courses.
Learn moreFrank Kim is the Founder of ThinkSec, a security consulting and CISO advisory firm. He leads the Cybersecurity Leadership and Cloud Security curricula at SANS, as well as authors and instructs multiple SANS courses.
Learn moreJason is a leading consultant sought after by Global 500 companies across finance, healthcare, and technology sectors worldwide. Over the years, he has led intrusion detection, penetration testing, defense improvement programs, and incident response.
Learn moreUsing cloud security solutions to respond to incidents and enable defenses
Explore learning pathBuilding security solutions for cloud workflows
Explore learning pathMonitor, test, detect, and investigate threats to cloud environments.
Explore learning pathDeveloping cloud security roadmaps, plans and procurement models that define policy and procedure
Explore learning pathDesigning the adoption of cloud services and define the tools and strategy for cloud solutions
Explore learning pathDefines technical system specs including cloud strategy and software integration to meet business or mission-aligned system requirements.
Explore learning pathWebcast 3 of 5 in our Special Series—Explore the full lineup here. With 78% of organizations now operating in hybrid or multi-cloud setups, traditional security approaches are falling short. When systems span cloud, on-prem, and endpoints, it becomes harder to maintain visibility, enforce consistent policies, and ensure resilience under pressure.
Prepare for the Next Era of Cloud Security
Cloud adoption continues to grow, and with it, the complexity of securing multiple cloud environments. The SANS 2025 Multicloud Survey will explore how organizations manage security at scale across diverse cloud service providers. This webcast aims to provide insights into survey results, including the tools, techniques, and strategies needed to secure multicloud environments effectively—offering valuable guidance for organizations navigating the complexities of cloud security at scale.
Security teams often find themselves reacting to cloud misconfigurations and policy violations after they occur—playing an endless game of security Whack-a-Mole.
Securing the cloud isn’t easy. Thales Group reported that the percentage of corporate data stored in the cloud has doubled from 2015 (30%) to 2022 (60%). Meanwhile, the 2023 Unit 42 Attack Surface Threat Report, published by a threat research branch of Palo Alto Networks, reported that “80% of security exposures were observed in cloud environments.” Because this percentage is significantly larger than the percentage of data in the cloud, this implies that the cloud is somehow uniquely vulnerable, or that the cloud is uniquely challenging for security teams.Enter the SANS CloudSecNext Summit Solutions Track 2025. This event will provide you with practical solutions to these challenges from some of the world’s leading experts. We will deliver the latest tools, techniques, and procedures for cloud, multicloud, and hybrid environments. We hope you will be able to take what you learn in this event to make your cloud environments as secure, if not more secure, than your infrastructure on-premises.
This focused track explores the ever-evolving world of Cloud IAM, diving into modern strategies, common missteps, and emerging tools designed to help organizations reclaim control over sprawling identities and creeping permissions.
Webcast 3 of 5 in our Special Series—Explore the full lineup here. With 78% of organizations now operating in hybrid or multi-cloud setups, traditional security approaches are falling short. When systems span cloud, on-prem, and endpoints, it becomes harder to maintain visibility, enforce consistent policies, and ensure resilience under pressure.