Module 5 Objectives
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
Hello, everyone. And welcome to Module five. In this session, we're gonna learn about another malware analysis technique memory Forensics
in module five, the memory forensics module. We have two main goals.
The first is to detail the memory forensics process. This will allow us to perform the steps necessary for proper memory acquisition.
And the second is to examine how memory forensics can aid us during our malware analysis. And we'll do that by looking at now where? Artifacts as they are present in memory.
All right, so let's kick off our memory forensics module by looking at the memory forensics process.
Memory Analysis Part 1
Memory Analysis Part 2
Module 5 Summary