SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsPeople often believe that Linux is a “secure” operating system or that they “don’t have much Linux” in their environment, so they “don’t need to worry about it.” However, this is rarely true. Linux attacks are becoming commonplace, and it is hard to imagine how any organization can operate without it, as Linux operating systems power our switches, routers, and more.
In this session, we will examine an intrusion into a Southeast Asia–based business, where the attackers almost entirely pivoted through the organization’s Linux estate. We’ll explore the lessons they had to learn about Linux incident response— and highlight some of the things they, and you, can do better in the future.
With FOR577, Taz has authored the first course to systematize threat hunting on Linux systems. His operational leadership—from military intelligence to heading a FTSE100 CSIRT—has fortified global cyber defense capabilities across sectors.
Read more about Tarot (Taz) Wake