Memory Dump Analysis: How to Extract Data from Memory – Volatility & Other Tools
Join Security MVP Paula Januszkiewicz in this unique opportunity to gain advanced cybersecurity skills. Learn how to perform digital forensics step by step, from memory collection to memory analysis, so you’ll have the skills to investigate advanced cyberattacks that are stealthy enough to avoid leaving traces on the computer hard drive.
What you will learn
Topics covered:
1. Digital Forensics: The Purpose
2. Memory Collection: Techniques
3. Memory Analysis: Tools
4. Other Tools
5. Memory Analysis: Case Studies
6. Summary
What’s included
- Access to 3-hour recorded practical lesson
- Training materials to download
- The virtual training covers: how to use 6 memory capture tools, how to configure an environment, analyze process activity, and search for hidden processes with memory analysis tools.
- 3 demos included
- Access to video recording and training materials for one year for you to keep and get back to whenever needed.
Additional information
PLEASE NOTE: It may take 2-3 business days for your course access to be activated. You will receive an email from us with all necessary details.
Only registered users can write reviews. Please Sign in or create an account