Companies Home Search Profile

Memory Forensics Masterclass for Incident Responders

Focused View

10:55:41

0 View
  • 1. Course Syllabus.mp4
    13:26
  • 2. Your Course Evaluation.mp4
    05:08
  • 3. Our Vision. Mission & About Instructor.mp4
    01:25
  • 4. Download your Course Bundle.mp4
    02:38
    • 4. Download your Course Bundle
    • Case Study1 lyst8982.7z
    • Case Study2 lyst2983.7z
    • Case Study3 lyst2304.7z
    • CheatSheet v2 4 lyst4028.pdf
    • Course Lab Memory Sample lyst8452.7z
    • Deck lyst8033.pdf
    • File-Download-SOP lyst7785.pdf
    • Other Memory Samples lyst2314.7z
    • Software lyst1873.7z
  • 1. Role of Memory.mp4
    07:15
  • 2. Reboot Sustainability.mp4
    05:07
  • 3. Order of Volatility.mp4
    04:08
  • 4. Need for Memory Forensics.mp4
    08:21
  • 5. Memory Acquisition Process.mp4
    05:26
  • 6. Memory Acquisition Challenges.mp4
    08:30
  • 1. Magnet RAM Capture.mp4
    04:40
  • 2. MoonSols DumpIt.mp4
    04:41
  • 3. Rekall winpmem.mp4
    05:38
  • 4. Belkasoft RAM Capture.mp4
    03:18
  • 5. Accessdata FTK Imager.mp4
    05:36
  • 6. Windows Native Solution.mp4
    04:30
  • 1. Memory Leak.mp4
    07:04
  • 2. Capture Process Memory.mp4
    08:02
  • 1. AVML.mp4
    04:57
  • 2. memcapture script.mp4
    04:23
  • 1. OSXPmem.mp4
    10:30
  • 1. Memory Analysis with Volatility2.mp4
    14:13
  • 2. Memory Analysis with Volatility3.mp4
    08:06
  • 3. Memory Analysis with MemProcFS.mp4
    18:09
  • 4. Memory Analysis with Orochi.mp4
    13:49
  • 5. Memory Analysis with Volatility Workbench.mp4
    04:14
  • 6. Memory Analysis with Volutility.mp4
    01:55
  • 1. Memory Management.mp4
    10:23
  • 2. Swapping.mp4
    04:21
  • 3. Virtual Memory and Paging.mp4
    06:51
  • 4. Address Translation.mp4
    05:00
  • 1. Analysis Roadmap.mp4
    17:28
  • 2. Image Identification.mp4
    15:48
  • 3. Processes and DLLs.mp4
    56:38
  • 4. Networking.mp4
    18:36
  • 5. Registry.mp4
    36:50
  • 6. Kernel memory and Objects.mp4
    24:17
  • 7. Creating Timeline.mp4
    21:22
  • 8. Quick Wins - Tips for Analysis.mp4
    18:38
  • 1. Creating Volatility Profile.mp4
    22:02
  • 2. Memory Parsing with Volatility.mp4
    10:50
  • 1. ShellCode Injection.mp4
    06:51
  • 2. DLL Injection.mp4
    10:39
  • 3. Process Hollowing.mp4
    04:03
  • 4. AtomBombing.mp4
    06:59
  • 5. Inline Hooking.mp4
    04:35
  • 1. malfind.mp4
    13:51
  • 2. Yara Scan.mp4
    08:40
  • 3. Process Extended View.mp4
    08:26
  • 4. Timers.mp4
    04:36
  • 5. Callbacks.mp4
    06:31
  • 1. Case Study 1.mp4
    02:19
  • 2. Uncover Case Study 1 RCA.mp4
    26:08
  • 3. Case Study 2.mp4
    02:45
  • 4. Uncover Case Study 2 RCA.mp4
    23:44
  • 5. Case Study 3.mp4
    05:18
  • 1. Docker Basics.mp4
    11:15
  • 2. Docler Components.mp4
    08:08
  • 3. Why Docker Forensics.mp4
    09:05
  • 4. Tools Required.mp4
    02:10
  • 5. Usercase 1 - Container Breakout.mp4
    05:34
  • 6. Usercase 2 - Credential Exposure.mp4
    02:59
  • 7. Usercase 3 - Network Anomalies.mp4
    07:13
  • 8. Useful Commands for Analysis.mp4
    17:00
  • 1. Guidelines.mp4
    02:39
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    We specialize in penetration testing, red teaming, and threat hunting. Let us help you find the holes in your security.
    • language english
    • Training sessions 65
    • duration 10:55:41
    • Release Date 2025/03/07