SDF: Memory Forensics 2

Master Windows memory forensics with hands-on training using Volatility. Learn to script and automate malware assessments efficiently.

  • Overview
  • Curriculum
  • Instructor
  • Review

Brief Summary

This course dives into Windows memory forensics with a focus on using Volatility. You'll get hands-on with memory images, automate tasks with scripting, and learn to identify and analyze malware, all within a chill one-hour session with free tools. Easy peasy, right?

Key Points

  • Learn Windows memory forensics using Volatility
  • Hands-on training with memory images to find evidence of compromise
  • Script automation for running plugins and refining data
  • Triage malware compromise assessments quickly
  • Use freely available tools

Learning Outcomes

  • Gain practical skills in memory forensics using Volatility
  • Learn to automate forensic processes with scripting
  • Develop efficient techniques for identifying malware
  • Understand how to interpret plugin outputs for investigations
  • Acquire a comprehensive methodology for Windows memory exams

About This Course

Learn Windows memory forensics

Learn to script Volatility and conduct a malware compromise assessment.

This class provides you with hands on training working with a memory image in order to find evidence of compromise. Step-by-step the course teaches students how to automate memory forensic processing as well as how to interpret the findings. By the end of the course students will have an efficient forensic tool and methodology that may be used for any windows memory forensic exam.

This class teaches students how to conduct memory forensics using Volatility.

  • Learn how to use & combine plugin results to identify malware

  • Learn how to create a script to automate running plugins and post-processing data refinement

  • Learn how to run and interpret plugins

  • Hands-on practicals reinforce learning

  • Learn all of this in about one hour using all freely available tools.

  • Learn how to use Volatility

  • Learn to do a fast-triage malware compromise assessment

  • Understand plugin output for investigations

Instructor

Profile photo of Michael Leclair
Michael Leclair

Over 20 years of experience in Digital Forensics and Security Incident Response. Investigations span corporate (Fortune 500) incident response, technical litigation support for civil and criminal cases, and e-discovery. Author and developer of computer forensic training and analysis tools. Specialties include Windows forensics, Linux forensics, Mac forensics, & mobile device forensics. Certifications include: C|EH, CFCE, CISSP, EnCE, CCE

Review
4.9 course rating
4K ratings
ui-avatar of Neeraj Rawat
Neeraj R.
2.0
9 months ago

The course revolves around a script and a walk through of it instead of the actuals hands on. The topics were already covered in SDF1, same thing is explained here via script which doesn't make sense with the Title 2.

Half of the course is useless for someone already done SDF 1, moreover the script doesn't run, neither creates desired /exports and results as shown

  • Helpful
  • Not helpful
ui-avatar of chandan paswan
Chandan P.
4.5
1 year ago

confusing setup process

  • Helpful
  • Not helpful
ui-avatar of Erick Arias
Erick A.
5.0
1 year ago

Good

  • Helpful
  • Not helpful
ui-avatar of Adrian Kydland Skaftun
Adrian K. S.
4.0
1 year ago

Good! was hoping for more theory on processes and more indepth on all the volatility modules, but this was also pretty helpfull

  • Helpful
  • Not helpful
ui-avatar of Harshal Vasudeo Sarode
Harshal V. S.
5.0
1 year ago

Very good course and practical explanations for tools.

  • Helpful
  • Not helpful
ui-avatar of Peter Adamko
Peter A.
3.5
2 years ago

I expected to learn what to look for in memory, not how to automically run volatility commands with a script.

  • Helpful
  • Not helpful
ui-avatar of Anonymized User
Anonymized U.
2.0
2 years ago

This course seemed to be more about writing a bash script for volatility rather than a more in depth expansion on the plugins of volatility and doing memory forensics.

  • Helpful
  • Not helpful
ui-avatar of Miroslav KaÄŤĂ­n
Miroslav K.
4.5
2 years ago

great course, only at the end I realized why it didn't work the way it was shown in the beginning and only at the end it was shown what should I do and also that why the results were different from the demo

  • Helpful
  • Not helpful
ui-avatar of Matthew C Jebb Sr.
Matthew C. J. S.
5.0
2 years ago

Great course

  • Helpful
  • Not helpful
ui-avatar of Rupesh Vihire
Rupesh V.
4.5
2 years ago

nice

  • Helpful
  • Not helpful
Leave A Reply

Your email address will not be published. Required fields are marked *

Ratings

Courses You May Like

Lorem ipsum dolor sit amet elit
Show More Courses