Free

Analyzing Attacks for Incident Handlers

An important but often overlooked process in incident handling is memory analysis. In this installment of David Biser’s series on incident response, he explains and demonstrates how to use memory analysis to investigate an attack and gain useful evidence from memory that may not otherwise be available.
1
21
M
Time
intermediate
difficulty
2
ceu/cpe

Course Content

Redline Analysis Lab Part 2

10m

Analyzing Attacks for Incident Handlers
Redline Analysis Lab Part 1

10m

Analyzing Attacks for Incident Handlers
VM and Malware Lab

9m

Analyzing Attacks for Incident Handlers
Redline Lab

10m

Analyzing Attacks for Incident Handlers
Lab Introduction

10m

Analyzing Attacks for Incident Handlers
Using FTK for Memory Analysis

11m

Analyzing Attacks for Incident Handlers
Memory Analysis Explanation

11m

Analyzing Attacks for Incident Handlers
Introduction to Memory Analysis

10m

Analyzing Attacks for Incident Handlers
Course Description

In Analyzing Attacks for Incident Handlers, David Biser explains memory analysis and how to use it to uncover information about a computer. He demonstrates this process of analyzing an attack using labs such as a Redline lab and a VM and Malware lab to conduct an analysis on a computer.

This course is part of a Career Path:
Become an Incident Handler
In this Career Path, you will learn the incident response process, from building an incident response kit and developing an incident response team, to identifying, containing, and recovering from incidents. We then steer away from a traditional “defensive-only” approach to introduce you to the attacker’s world.

Instructed by

Instructor
David Biser

Hello! My name is David and I live in the western region of Maryland, where the deer and the black bears do roam! I have been involved in Cyber Security for over 10 years as a criminal investigator,penetration tester, digital forensic analyst and incident responder. I hold multiple certificates in the cyber security field and spend my time reviewing logs, conducting forensic investigations and teaching. I enjoy cyber security so much that I teach at a local college to encourage and help others both enter the field and expand their career options.

When I am not working on something cyber I enjoy a wide range of activities (provided my back allows it!). I hike, hunt, fish, read a wide variety of material and spend time with my family.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Analyzing Attacks for Incident Handlers Certificate of Completion