Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lab-based lesson offers step by step instructions in how to navigate the H drive on the computer to hash files in order to produce a result which can be exported to a notepad. This preserves the integrity of a file and allows an investigator to gather volatile information. This lesson also covers the use of Mandiant Redline, which allows the collection of volatile memory and analysis.