Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Investigating Malware Using Memory Forensics - A Practical Approach

Black Hat via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course on investigating malware using memory forensics aims to teach learners how to detect, investigate, and understand the capabilities of malicious software. The course covers practical concepts of memory forensics, including memory acquisition, analysis of infected systems, investigating process injection, rootkits, and malware stealth techniques. The teaching method includes various demonstrations to illustrate the tricks and techniques used by malware. The course is designed for individuals interested in cybersecurity, digital forensics, and malware analysis.

Syllabus

Investigating Malware Using Memory Forensics - A Practical Approach
Monnappa KA • Info Security Investigator - Cisco CSIRT • Author of the Book: Learning Malware Analysis • Member of Black Hat Review Board • Co-founder Cysinfo Security Community • Creator of Limon Sandbox • Winner of Volatility Plugin Contest 2016
Memory Acquisition - Dumping the memory of a target machine to disk
Memory Analysis of Infected System (KeyBase Malware)
Memory Analysis of Infected System (Darkcomet RAT)
Investigating Hollow Process Injection
Investigating Rootkits
Memory Analysis of ZeroAccess Rootkit
Example - Memory Analysis of Necurs Rootkit

Taught by

Black Hat

Reviews

Start your review of Investigating Malware Using Memory Forensics - A Practical Approach

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.