Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customize your settings, hit “Customize Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

This article is more than 1 year old

Hunt or be hunted: Get top advice and training from SANS on how to track'n'thwart hackers

From incident response and forensics to disassemblers and debuggers, it's all covered

Promo No matter how thorough your security preparations, chances are that hidden threats already lurk inside your organisation's networks. Even the most advanced security and monitoring tools can’t be solely relied upon on to keep persistent adversaries out of your systems.

SANS Institute’s Threat Hunting and Incident Response Summit event taking place in London, UK, provides advice and in-depth training on how to track down attackers and prevent them from targeting your networks.

The one-day summit on 13 January brings together industry leaders and security experts to talk about successful threat hunting techniques and tools, plus present illustrative case histories.

The summit is followed by six days of immersive security training courses and workshops starting on 14 January. All attendees are promised they will return to work fully armed with effective defensive skills ready to combat real-world threats.

Choose between these courses:

Advanced incident response, threat hunting and digital forensics
A new course focusing on detecting attacks that get past security systems. The key is to catch intrusions in progress, identify compromised systems, perform damage assessments, and determine what was stolen. Building up threat intelligence helps stop future intrusions.

Hacker tools, techniques, exploits, and incident handling
Cyber attacks are increasing in viciousness and stealth. Learn the criminals’ tactics, and gain hands-on experience in finding vulnerabilities. Legal issues include employee monitoring, working with law enforcement, and handling evidence.

Defeating advanced adversaries: purple Team tactics and kill chain defences
Enterprises of all sizes are at risk of ransomware attacks. Learn how to defend against them from real-world examples and hands-on practice in more than 20 labs. Finish with a full-day Defend-the-Flag exercise.

Advanced network forensics: threat hunting, analysis, and incident response
Network evidence often provides the best view of a security incident. The focus is on the skills needed to examine network communications in investigative work, with numerous use cases.

Cyber threat intelligence
Proper analysis of an adversary's intent and opportunity to do harm is key to cyber threat intelligence. Learn how to collect and classify adversaries’ methods and increase your preparedness with each intrusion.

Reverse-engineering malware: malware analysis tools and techniques
Turn malware inside out and acquire the practical skills to examine malicious programs that target Windows systems. The course uses various monitoring utilities, a disassembler, a debugger, and other freely available tools.

Full details on the summit event, and how to register, are right here.

Similar topics

TIP US OFF

Send us news