SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsOver the past several years, global news coverage has been plagued with media headlines of multiple private and public institutions falling victim to significant data breaches. With this fact in mind, it is important to note that these breaches are happening in spite of the fact that there have been heavy investments in cybersecurity resources (people, processes, technology, etc.) over the past several years. When one combines the idea that significant data breaches continue to happen while large investments have been made to mitigate them, it paints a picture of an ineffective response to the problem. As such, two critical questions require further investigation. The first is what is preventing leadership from creating an effective response to the global cybersecurity problem? The second is how can the Critical Security Controls (CSCs) be used by leadership to overcome these challenges and improve effectiveness within their organization?