Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=w9XepTxrodc



Duration: 0:46
10,671 views
19


The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn't!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. As defenders, it is essential we understand these hacking tools and techniques.

This course enables you to turn the tables on computer attackers by helping you understand their tactics and strategies in detail, giving you hands-on experience in finding security vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan.

Kevin Fiscus is the founder of and lead consultant for Cyber Defense Advisors where he performs security and risk assessments, vulnerability and penetration testing, security program design, policy development, and security awareness with a focus on serving the needs of small and mid-sized organizations. Kevin has over 20 years of IT experience and has focused exclusively on information security for the past 12.




Other Videos By SANS Institute


2019-07-24Scanners, Tunnels, and Sims, Oh My! - SANS ICS Security Summit 2019
2019-07-23Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
2019-07-22Threat Hunting via Sysmon - SANS Blue Team Summit
2019-07-17Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019
2019-07-15To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
2019-07-12OSINT: Not Just Offensive - SANS Blue Team Summit
2019-07-01Defeating Attackers with Preventative Security
2019-06-13Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking
2019-06-13Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
2019-06-13Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
2019-06-13Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
2019-06-13Key Take-Aways from SEC401: Security Essentials Bootcamp Style
2019-06-13Key Take-Aways from SEC503: Intrusion Detection In-Depth
2019-06-10What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
2019-05-28Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
2019-05-27Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
2019-05-24Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
2019-05-23Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
2019-05-22Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
2019-05-21Using More Words Than Necessary - Common Cybersecurity Writing Mistakes
2019-05-20Applying Inconsistent Formatting - Common Cybersecurity Writing Mistakes



Tags:
SANS SEC504
Kevin Fiscus
SANS Institute
Incident Handling
Computer Crime Investigation
Penetration Testing
PenTest