SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsWithin any organization, securing information assets appropriately is a very important part of the Information Security Management System (ISMS) puzzle. Unfortunately, many organizations leave the configuration of those assets up to the preferences of a very small, autonomous group of folks. Using the Windows 7 platform as an example, we will walk through a few of the secure configuration items of this operating system, highlighting ways to increase awareness and participation so that all groups can have a stake in the direction of securing their information assets through a common set of industry acceptable standards.