SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis paper will focus on how to establish a successful post acquisition audit and to ensure the key areas of risk are identified and reviewed. Although multiple areas of risk will be introduced which may include financial, legal, political, or economic, the emphasis will be around information security risks.