PLU | Getting Started With Windows Memory Forensics (2019 EN)

Discussion in 'Information Technology' started by Kanka, Nov 26, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,047
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Corey Charles
    Full Title: Getting Started With Windows Memory Forensics
    Year: 2019
    Language: English
    Genre: Educational: Security
    Skill Level: Beginner
    Price: -
    -
    Files: MP4 (+ Slides .PDF)
    Time: 00:52:36
    Video: AVC, 1024 x 768 (1.333) at 30.000 fps, 150 kbps
    Audio: AAC at 96 Kbps, 2 channels, 48.0 KHz



    By learning how to capture computer memory and profile its contents, you'll add an invaluable resource to your incident response, malware analysis, and digital forensics capabilities.

    Companies protect themselves with digital defenses such as firewalls, encryption, and signature/heuristic scanning. Additionally, nations plan attacks by targeting power grids, infiltrating military data centers, and stealing trade secrets from both public and private sectors. In this course, Getting Started with Windows Memory Forensics, you will gain the ability to examine the different compartments of the windows operating system to discover abnormal or malicious behavior. First, you will learn how to examine process memory. Next, you will discover how to identify malicious network connections. Finally, you will explore how to detect code injection and perform memory extraction and analysis. When you are finished with this course, you will have the skills and knowledge of Windows Memory Forensics needed to examine the different compartments of the windows operating system to discover abnormal or malicious behavior.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Allocating Windows Objects and Pool
    02. Collecting Volatile Data
    03. Systems Overview
    04. Data Structures
    05. The Volatility Framework
    3. Processing Memory Internals
    06. Memory Acquisition
    07. Preserving the Digital Environment
    08. The Risk of Acquisition
    09. Atomicity
    10. Physical and Virtual Memory
    11. Local Aquisition
    12. Remote Acquisition
    13. Runtime Interrogation
    4. Hunting Malware in Process Memory
    14. Hunting Malware in Process Memory
    15. Process Environment Block
    16. Data Structures
    17. Finding Text on Notepads Heap
    18. Environment Variables
    19. Attacks on Environment Variables
    20. Standard Handles
    21. DLL
    22. How DLLs Are Loaded
    23. PE Files
    24. Code Injection
    5. Course Wrap Up
    25. Course Wrap Up
    26. Processing Memory Internals Wrap Up
    27. Hunting Malware in Process Memory Wrap Up


    -------------