Cyber Security Trainings | Solution Deployment | SOC Services | Project Management
Cyber Security Trainings | Solution Deployment | SOC Services | Project Management
Signed in as:
filler@godaddy.com
In this course the attendees will learn how to analyse Memory and extracting different types of Artifacts from Memory image. This course is specially design for Cyber security professional who are involved in analysing memory as a part of Incident investigations process. In the first part of the course, the attendees will learn different ways to acquire raw memory for different types of operating systems, identifying and collecting different types of Artifacts.
In the second stage, the attendees will learn how to leverage these collected Artifacts/IOC’s for performing Threat Hunting and investigating potential lateral movement.
Day 1
Day 2
Memory Forensics is an advanced level course that covers various tools and Techniques to analyse memory. It is highly recommended that the attendees should have a good working level knowledge of windows operating system. Although, It is advisable to have some prior background and experience in Cyber Security, but it is not a must have as this course will start from the basics and get into advanced topics and hands-on labs.
It is highly recommended that all the attendees should bring their own laptop with the following Software/Hardware requirements:
Course Brouchure (pdf)
Download