Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Incident Response: Host Analysis

Walking into an incident response situation can be intimidating. This course will teach you how to analyze the endpoint traffic, perform memory dump analysis, and begin to piece together the story of what happened.

Aaron Rosenmund - Pluralsight course - Incident Response: Host Analysis
Aaron Rosenmund
What you'll learn

In an incident response scenario, gathering artifacts for analysis can be stressful. In this course, Incident Response: Host Analysis, you'll learn how to analyze host artifacts in a compromised environment. First, you'll evaluate an endpoint to determine root cause of an incident. Next, you'll perform memory dump analysis to look for volatile artifacts. Finally, correlate connection logs and extract addition artifacts to determine the incident's full scope. When you're finished with this course, you'll have the skills necessary to operate as an incident response host analyst and understand how to synchronize with the other phases of incident response.

Table of contents

About the author
Aaron Rosenmund - Pluralsight course - Incident Response: Host Analysis
Aaron Rosenmund

Aaron M. Rosenmund is a cyber security operations subject matter expert, with a background in federal and business defensive and offensive cyber operations and system automation.

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight