Module 5 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
3 hours 41 minutes
Difficulty
Advanced
CEU/CPE
5
Video Transcription
00:00
All right, So now let's wrap up our memory forensics module with a brief summary
00:06
in Module five, we perform memory forensics. We did this by first looking at the different parts of the memory forensics process and learn how to add memory forensics into our overall malware analysis process.
00:20
Then we looked at the first stage of memory forensics, which is acquisition, and we used the tool dump it to acquire a snapshot of a target machine's memory.
00:29
Once we acquired the memory, we explored the second stage of the memory forensics process, which is memory analysis.
00:36
During memory analysis, we learned about the various volatility plug ins that allow us to extract information from our memory image while utilizing these plug ins to extract different process and Mauer artifacts.
00:50
Alright, everyone, that is the end of module five. So let's wrap up the course with a brief summary
Up Next
Advanced Malware Analysis: Redux

In this course, we introduce new techniques to help speed up analysis and transition students from malware analyst to reverse engineer. We skip the malware analysis lab set up and put participants hands on with malware analysis.

Instructed By