OS Analysis with Volatility
Offered By: Pluralsight
Course Description
Overview
In this course, you will learn how to perform OS analysis of volatile memory using the tool volatility, the most advanced memory forensics framework.
In this course, OS analysis with Volatility, you will cover how to utilize Volatility to identify and detect evidence of suspected compromise such as malicious commands and programs executed on a host computer system. You will learn how to extract the command line history from the volatile memory. You will also learn how to initiate an investigation of malicious programs and how to defend against malicious program execution. When you are finished with the course, you will have the skills and knowledge to aid in mitigating technique T1055 and 1059.
In this course, OS analysis with Volatility, you will cover how to utilize Volatility to identify and detect evidence of suspected compromise such as malicious commands and programs executed on a host computer system. You will learn how to extract the command line history from the volatile memory. You will also learn how to initiate an investigation of malicious programs and how to defend against malicious program execution. When you are finished with the course, you will have the skills and knowledge to aid in mitigating technique T1055 and 1059.
Syllabus
- Course Overview 2mins
- Detect and Respond with Volatility 24mins
- Resources 0mins
Taught by
Tim Coakley
Related Courses
Cyber Security Foundations: Common Malware Attacks and Defense StrategiesEC-Council via FutureLearn Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Digital Forensics and Incident Response (DFIR): An Introduction
PA Consulting via FutureLearn CNIT 126: Practical Malware Analysis
CNIT - City College of San Francisco via Independent MacOS Dylib Injection through Mach-O Binary Manipulation
Malware Unicorn via Independent