SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThink like an adversary, act like an ally.
In today's rapidly evolving threat landscape, red teaming plays a crucial role in cybersecurity. As threats continue to advance and become more sophisticated, organizations must proactively assess their security measures. Red teaming involves testing the effectiveness of people, processes, and technology through objective-oriented assessments that simulate realistic attacker techniques. By leveraging threat intelligence and emulating real-world environments, red teams provide invaluable insights into an organization's vulnerabilities. This practice helps identify weaknesses, enhance defense strategies, and strengthen incident response capabilities. The main objective of red teaming is to make the blue team better by informing both offense and defense. By continually challenging and refining security measures, organizations can stay one step ahead of emerging threats. Through the collaborative efforts of red and blue teams, organizations can effectively mitigate risks, safeguard sensitive data, and maintain a robust security posture in the face of evolving cyber threats.
Pivoting, tunneling, and redirection are essential skills that separate the junior and senior operators in the offensive security landscape. This workshop describes various techniques used to creatively route traffic through multiple network segments which you then practice the skills you've learned in a cyber range during and after the workshop. These are essential skills for every pentester, bug bounty hunter, and red team operator, as well as defenders learning techniques for detecting these sorts of suspicious traffic in their network.
This workshop serve is a prerequisite for those interested in taking the SEC670 course. This first part will cover basic items such as, setting up Visual Studio Community, creating a project, developing your first project, etc. We will then dive into the C programming language itself covering data types, the anatomy of a function, statements, variables, directives, and debugging.
The best defense is a strong offense. Red Team sets the pace for protecting the entire organization. SEC565 trains security professionals to take the lead. Learn how to execute repeatable Red Team engagements, with an emphasis on people, processes, and technologies to ready Blue Team defenses. Develop and improve Red Team operations by employing techniques for security controls through adversary emulation, cyber threat intelligence, Red Team tradecraft, and engagement planning.
Learn MoreMalware is becoming more lethal. Red Teams must understand these increasingly complex attacks that threaten safety. SEC670 takes offensive operations to a new level. This course introduces techniques that real nation-state malware actors are deploying today. Red Teams will learn how to develop custom-compiled offensive tools through programming, APIs, and applied mitigations for techniques covering privilege escalation, persistence, and collection. This training is a must-have for cybersecurity practitioners working in the areas of Defense, Government, Critical Infrastructure, Energy and Financial Services.
Learn More