SDF: Memory Forensics 1

Master Windows memory forensics with Volatility. Conduct compromise assessments, analyze memory images, and gain valuable skills for incident response in just one hour.

  • Overview
  • Curriculum
  • Instructor
  • Review

Brief Summary

In this fun course, you’ll dive into Windows memory forensics and learn how to use Volatility to assess compromises quickly. You’ll be hands-on with raw memory and plugins, all in about an hour, using free tools. Super easy and effective for beginners and pros alike!

Key Points

  • Use Volatility for memory forensics.
  • Conduct a quick-compromise assessment.
  • Work with raw memory images and hibernation files.
  • Run and interpret plugins effectively.
  • Hands-on practice reinforces what you learn.

Learning Outcomes

  • Become skilled in using Volatility for memory analysis.
  • Master fast-triage techniques for detecting compromises.
  • Gain confidence in interpreting plugin outputs.
  • Understand raw memory and hibernation files.
  • Engage in practical exercises to solidify your skills.

About This Course

Learn Windows memory forensics

*** COURSE COMPLETELY REWRITTEN AND UPDATED 2019 ***

Learn to use Volatility to conduct a fast-triage compromise assessment.

A system's memory contains an assortment of valuable forensic data. Memory forensics can uncover evidence of compromise, malware, data spoliation and an assortment of file use and knowledge evidence - valuable skills for both incident response triage work as well as in digital forensic exams involving litigation.

This class teaches students how to conduct memory forensics using Volatility.

  • Learn how to do a fast-triage compromise assessment

  • Learn how to work with raw memory images, hibernation files and VM images

  • Learn how to run and interpret plugins

  • Hands-on practicals reinforce learning

  • Learn all of this in about one hour using all freely available tools.

  • Learn how to use Volatility

  • Learn to do a fast-triage compromise assessment

  • Understand plugin output for investigations

Instructor

Profile photo of Michael Leclair
Michael Leclair

Over 20 years of experience in Digital Forensics and Security Incident Response. Investigations span corporate (Fortune 500) incident response, technical litigation support for civil and criminal cases, and e-discovery. Author and developer of computer forensic training and analysis tools. Specialties include Windows forensics, Linux forensics, Mac forensics, & mobile device forensics. Certifications include: C|EH, CFCE, CISSP, EnCE, CCE

Review
4.9 course rating
4K ratings
ui-avatar of Neeraj Rawat
Neeraj R.
4.0
9 months ago

The course is good to begin with, however it would have been better to cover the setup of volatility on different platforms, instead of directly using a readymade distro.

It would have been better to cover a bit of theory about the subject of the course eg: memdump. mem.raw, hiberfil etc

The author could have also shown the live memory capture instead of pointing to another course that hasn't been updates since 2015. Overall it's a good course to begin with and then explore more based on the " The Art o Memory Forensics " book. It will be great to introduce more detailed courses for intermediate and advanced level before anyone else does to be the Best selling author in this field.

  • Helpful
  • Not helpful
ui-avatar of MD Rehan Alam
Md R. A.
5.0
9 months ago

Excellent content on memory forensics for the beginner. The "Triage" section is a must in this course.

  • Helpful
  • Not helpful
ui-avatar of Vismay Patel
Vismay P.
4.5
1 year ago

wonderful teaching session with hands on experience and with basic cover up.

  • Helpful
  • Not helpful
ui-avatar of Vipin Razdan
Vipin R.
5.0
1 year ago

It was an eye opener for me.

  • Helpful
  • Not helpful
ui-avatar of Min Kyu Shin
Min K. S.
5.0
1 year ago

simple and thorough review of volatility

  • Helpful
  • Not helpful
ui-avatar of chandan paswan
Chandan P.
3.0
1 year ago

Only theory , even theory can be covered through doc or pdf also.

  • Helpful
  • Not helpful
ui-avatar of Abin Oommen Philip
Abin O. P.
3.5
1 year ago

The image given in resources that's said to be used in lecture does not contain the anomalies shown in lecture. Thus we cannot replicate the results. For example I could not locate scvhost (misspelled process) on listing all windows non core process. . Neither could i locate q.exe and 3.exe listed during boot time check examples. The text file in video seems edited to incorporate these results. Overall the course explanation was good expect for the above issue.

  • Helpful
  • Not helpful
ui-avatar of Lucas Flores
Lucas F.
5.0
1 year ago

clear, concise, easy to follow and understand.

  • Helpful
  • Not helpful
ui-avatar of Oscar Dickenson
Oscar D.
5.0
2 years ago

Good information

  • Helpful
  • Not helpful
ui-avatar of Jesus Andrade
Jesus A.
5.0
2 years ago

fue una excelente eleccion ya que muestra una nueva herramienta adicional para el análisis de la memoria

  • Helpful
  • Not helpful
Leave A Reply

Your email address will not be published. Required fields are marked *

Ratings

Courses You May Like

Lorem ipsum dolor sit amet elit
Show More Courses