Description
Course info
Level
Beginner
Updated
Aug 13, 2019
Duration
53m
Description

Companies protect themselves with digital defenses such as firewalls, encryption, and signature/heuristic scanning. Additionally, nations plan attacks by targeting power grids, infiltrating military data centers, and stealing trade secrets from both public and private sectors. In this course, Getting Started with Windows Memory Forensics, you will gain the ability to examine the different compartments of the windows operating system to discover abnormal or malicious behavior. First, you will learn how to examine process memory. Next, you will discover how to identify malicious network connections. Finally, you will explore how to detect code injection and perform memory extraction and analysis. When you are finished with this course, you will have the skills and knowledge of Windows Memory Forensics needed to examine the different compartments of the windows operating system to discover abnormal or malicious behavior.

About the author
About the author

Corey Charles has over 13 years of IT Security Experience with a focus in Vulnerability Management and Computer Forensics.

More from the author
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hi, everyone. My name is Corey Trolls and welcome to my course. Getting started with Windows Forensics. I'm the CEO and C I t security consultant at Dream Vision. I t. Sales discourses. The introductory course. Two Windows memory forensics, basic knowledge of networking and the Windows operating system is required. Somebody made. The topics we will cover include what examining process members to identifying malicious network connections, three code injection and four memory extraction and analysis. By the end of its course, you would know how to examine a different compartments of the Windows operating system to discover abnormal or malicious behavior before beginning the course. You should be familiar with Windows Operating system and basic network and protocols. Hope you join me on his journey to learn howto forensically investigate the Windows operating system memory with the getting started with Windows ruins, of course, absolutely.