3 hours 41 minutes
All right, So now let's wrap up our memory forensics module with a brief summary
in Module five, we perform memory forensics. We did this by first looking at the different parts of the memory forensics process and learn how to add memory forensics into our overall malware analysis process.
Then we looked at the first stage of memory forensics, which is acquisition, and we used the tool dump it to acquire a snapshot of a target machine's memory.
Once we acquired the memory, we explored the second stage of the memory forensics process, which is memory analysis.
During memory analysis, we learned about the various volatility plug ins that allow us to extract information from our memory image while utilizing these plug ins to extract different process and Mauer artifacts.
Alright, everyone, that is the end of module five. So let's wrap up the course with a brief summary
Advanced Malware Analysis: Redux
In this course, we introduce new techniques to help speed up analysis and transition students from malware analyst to reverse engineer. We skip the malware analysis lab set up and put participants hands on with malware analysis.