Module 5 Summary
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
All right, So now let's wrap up our memory forensics module with a brief summary
00:06
in Module five, we perform memory forensics. We did this by first looking at the different parts of the memory forensics process and learn how to add memory forensics into our overall malware analysis process.
00:20
Then we looked at the first stage of memory forensics, which is acquisition, and we used the tool dump it to acquire a snapshot of a target machine's memory.
00:29
Once we acquired the memory, we explored the second stage of the memory forensics process, which is memory analysis.
00:36
During memory analysis, we learned about the various volatility plug ins that allow us to extract information from our memory image while utilizing these plug ins to extract different process and Mauer artifacts.
00:50
Alright, everyone, that is the end of module five. So let's wrap up the course with a brief summary
Up Next
Instructed By
Similar Content