Memory Forensics Masterclass for Incident Responders
Focused View
10:55:41
0 View
1. Course Syllabus.mp4
13:26
2. Your Course Evaluation.mp4
05:08
3. Our Vision. Mission & About Instructor.mp4
01:25
4. Download your Course Bundle.mp4
02:38
- 4. Download your Course Bundle
- Case Study1 lyst8982.7z
- Case Study2 lyst2983.7z
- Case Study3 lyst2304.7z
- CheatSheet v2 4 lyst4028.pdf
- Course Lab Memory Sample lyst8452.7z
- Deck lyst8033.pdf
- File-Download-SOP lyst7785.pdf
- Other Memory Samples lyst2314.7z
- Software lyst1873.7z
1. Role of Memory.mp4
07:15
2. Reboot Sustainability.mp4
05:07
3. Order of Volatility.mp4
04:08
4. Need for Memory Forensics.mp4
08:21
5. Memory Acquisition Process.mp4
05:26
6. Memory Acquisition Challenges.mp4
08:30
1. Magnet RAM Capture.mp4
04:40
2. MoonSols DumpIt.mp4
04:41
3. Rekall winpmem.mp4
05:38
4. Belkasoft RAM Capture.mp4
03:18
5. Accessdata FTK Imager.mp4
05:36
6. Windows Native Solution.mp4
04:30
1. Memory Leak.mp4
07:04
2. Capture Process Memory.mp4
08:02
1. AVML.mp4
04:57
2. memcapture script.mp4
04:23
1. OSXPmem.mp4
10:30
1. Memory Analysis with Volatility2.mp4
14:13
2. Memory Analysis with Volatility3.mp4
08:06
3. Memory Analysis with MemProcFS.mp4
18:09
4. Memory Analysis with Orochi.mp4
13:49
5. Memory Analysis with Volatility Workbench.mp4
04:14
6. Memory Analysis with Volutility.mp4
01:55
1. Memory Management.mp4
10:23
2. Swapping.mp4
04:21
3. Virtual Memory and Paging.mp4
06:51
4. Address Translation.mp4
05:00
1. Analysis Roadmap.mp4
17:28
2. Image Identification.mp4
15:48
3. Processes and DLLs.mp4
56:38
4. Networking.mp4
18:36
5. Registry.mp4
36:50
6. Kernel memory and Objects.mp4
24:17
7. Creating Timeline.mp4
21:22
8. Quick Wins - Tips for Analysis.mp4
18:38
1. Creating Volatility Profile.mp4
22:02
2. Memory Parsing with Volatility.mp4
10:50
1. ShellCode Injection.mp4
06:51
2. DLL Injection.mp4
10:39
3. Process Hollowing.mp4
04:03
4. AtomBombing.mp4
06:59
5. Inline Hooking.mp4
04:35
1. malfind.mp4
13:51
2. Yara Scan.mp4
08:40
3. Process Extended View.mp4
08:26
4. Timers.mp4
04:36
5. Callbacks.mp4
06:31
1. Case Study 1.mp4
02:19
2. Uncover Case Study 1 RCA.mp4
26:08
3. Case Study 2.mp4
02:45
4. Uncover Case Study 2 RCA.mp4
23:44
5. Case Study 3.mp4
05:18
1. Docker Basics.mp4
11:15
2. Docler Components.mp4
08:08
3. Why Docker Forensics.mp4
09:05
4. Tools Required.mp4
02:10
5. Usercase 1 - Container Breakout.mp4
05:34
6. Usercase 2 - Credential Exposure.mp4
02:59
7. Usercase 3 - Network Anomalies.mp4
07:13
8. Useful Commands for Analysis.mp4
17:00
1. Guidelines.mp4
02:39
More details
User Reviews
Rating
average 0
Focused display
Category

BlackHills
View courses BlackHillsWe specialize in penetration testing, red teaming, and threat hunting. Let us help you find the holes in your security.
- language english
- Training sessions 65
- duration 10:55:41
- Release Date 2025/03/07