SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsResilient cybersecurity leadership is critical for protecting digital assets, managing cyber risks, and aligning security with business goals. Informed leaders bridge the gap between technical teams and executives, drive security strategies, ensure regulatory compliance, manage effective incident response, and foster a security-first culture.
Effective cybersecurity leadership demands technical expertise, strategic vision, and strong communication. SANS Cybersecurity Leadership training prepares rising CISOs and senior leaders to manage risk, align security with business objectives, cultivate a proactive security mindset, and lead agile teams. With advanced training in vulnerability management, operational leadership, incident response, and cloud governance, SANS equips professionals to anticipate threats, shape strategy, and lead the future of cybersecurity.
Learn to align security strategies with business objectives while effectively conveying risks, priorities, and initiatives to board members, executives, and technical teams.
Gain the skills to build, mentor, and lead high-performing security teams, fostering collaboration, resilience, and a strong security culture.
Develop the ability to lead with confidence during crises, manage incidents effectively, and make critical security decisions under pressure.
SANS continues to set the bar high on how to teach and how individuals can absorb leadership material. This class and learning strategy do an amazing job providing purpose, direction, and motivation to influence change through education!
Steve brings 25+ years of cybersecurity experience, including 12 years in incident response and management. Following his career in the UK Royal Air Force, Steve developed expertise in managing cyber incidents in high-pressure environments worldwide.
Learn moreRussell is a Principal Consultant and Co-Founder of Cyverity with extensive cybersecurity leadership experience. As former CIO and CISO of the Federal Reserve Bank of Atlanta, he brings real-world expertise to his role as SANS Principal Instructor.
Learn moreDavid has 20+ years of experience in vulnerability management, application security, and DevOps. He's developed technical security training initiatives, and believes vulnerability management is one of the most important foundations of cybersecurity.
Learn moreFrank Kim is the Founder of ThinkSec, a security consulting and CISO advisory firm. He leads the Cybersecurity Leadership and Cloud Security curricula at SANS, as well as authors and instructs multiple SANS courses.
Learn moreJason is a leading consultant sought after by Global 500 companies across finance, healthcare, and technology sectors worldwide. Over the years, he has led intrusion detection, penetration testing, defense improvement programs, and incident response.
Learn moreMark Orlando brings extensive cybersecurity leadership experience from the Pentagon, White House, and Fortune 500 sectors. As Bionic Cyber's CEO, he's a respected security operations expert with military and academic credentials.
Learn moreDaily focus is on the leadership of technical teams. Includes titles such as Technical Director, Manager, and Team Lead.
Explore learning pathDaily focus is on the leadership of technical teams. Includes titles such as Technical Director, Manager, and Team Lead.
Explore learning pathManages an organisation’s cybersecurity strategy and its implementation to ensure that digital systems, services and assets are adequately secure and protected.
Explore learning pathResponsible for developing cybersecurity workforce plans, assessments, strategies, and guidance, including cybersecurity-related staff training, education, and hiring processes. Makes adjustments in response to or in anticipation of changes to cybersecurity-related policy, technology, and staffing needs and requirements. Authors mandated workforce planning strategies to maintain compliance with legislation, regulation, and policy.
Explore learning pathResponsible for managing the cybersecurity of a program, organization, system, or enclave.
Explore learning pathAlign technology, business strategy, and people.
Explore learning pathAlign technology, business strategy, and people.
Explore learning pathNot all vulnerabilities are created equal—and fixing everything just isn’t realistic. This session shows how to align vulnerability prioritization with real-world risk.
Join us for a research-driven webcast that unveils and explores the key findings of the 2025 Cybersecurity Workforce Research Report by SANS | GIAC. This comprehensive, global study delivers unparalleled insights into the cybersecurity talent landscape, highlighting the essential strategies for building and maintaining high-performing teams.
You’ve patched systems and prioritized risk—but if your stakeholders don’t understand what you’re doing or why it matters, progress stalls.
Join us for a research-driven webcast that unveils and explores the key findings of the 2025 Cybersecurity Workforce Research Report by SANS | GIAC. This comprehensive, global study delivers unparalleled insights into the cybersecurity talent landscape, highlighting the essential strategies for building and maintaining high-performing teams.