Hotline: 1800 PROGRESO (1800 776 4737)

Surviving Digital Forensics: Memory Analysis 1
A system's memory contains an assortment of valuable forensic data. A computer analyst trained in memory forensics can use this data to determine if a system has been infected with malware - a valuable skill for both incident response triage work as well as in digital forensic exams involving litigation.
This class provides you with the foundation knowledge to help you identify suspicious processes running in memory. Learn how to conduct a "level 1" triage of Windows memory which includes observing running processes and being able to identify suspicious behaviors. Further memory analysis is based on the fundamentals taught here.
  • Learn about notable Windows processes found on most systems.
  • Learn how to profile legitimate process behavior.
  • Learn how to triage memory and identify suspicious processes.
  • Hands-on practicals reinforce learning
  • Learn a method to continue to teach yourself more about legitimate process behavior.
  • Learn all of this in about one hour using all freely available tools.
What are the requirements?
Students need a Windows 7 or Windows 8 system (virtual machine preferred)
Willingness to learn!
What am I going to get from this course?
  • Identify notable windows processes
  • Profile legitimate process behavior
  • Identify suspicious processes running in memory
  • Perform a "level 1" triage of Windows memory
  • Continue to teach yourself how to profile other Windows processes
What is the target audience?
  • Computer forensic analysts
  • Computer security incident responders
  • computer crime investigators
  • IT professionals
  • Students
Click HERE for the Course Outline.
Use Coupon Code: PROGRESO30 for 30% discount.
Course Schedule
Related Courses
Cisco CCNA Security: The A, B, C's of IPv6
This course covers IPv6 protocol in detail. It will compare the differences between the IPv4 to IPv6, and the benefits that IPv6 brings to the...
IPv6 Essentials - Foundations of the new Internet Protocol
This course covers all major aspects of the new Internet Protocol and what changed, compared to IPv4.
IPv6 - learn the basics of the new IP protocol
Understand how IPv6 works. Difference between the address spaces. How Ipv6 addresses are constructed and shortened.
Introduction to the Internet of Everything Preview
Internet and its evolution to the interconnection of people, processes, data, and things
Introduction to Cyber Security - SkillsFuture Approved
Learn the basic and vital components of Cyber Security & Cyberspace. In this course you learn cyber security components!
The Complete Cyber Security Course : Network Security!
Volume 2 : Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark. Plus the Best Password Managers
Hacking & Digital Forensics & Autopsy - Stay Anonymous
With Technology Advancement, staying anonymous and protecting your online and offline activities is critical.
Internet and Computer Security: Protect Yourself Online!
Learn how to protect your identity and information online using tried and tested techniques, tips and tricks.
Become Computer Forensics Expert & Start your career!
The best Computer Forensics course! From Beginner to Professional.
Surviving Digital Forensics: Resolving Attached USBs
A forensic guide for linking USB activity to Windows computer systems
Surviving Digital Forensics: Windows Prefetch
Helping you sharpen your computer forensic skills to prove file use and knowledge.
Surviving Digital Forensics: Link Files
A computer forensic guide for understanding LINK file evidence on Windows computer systems
Your Name
Contact No
Text Limit :
Security Code