Memory Dump Analysis: How to extract data from memory – volatility & other tools

by CQURE Expert Paula Januszkiewicz

The CyberBytes are virtual trainings developed to provide practical skills required of cybersecurity professionals. Take the CyberByte from world-class cybersecurity pros and stand up to the pace of fast-changing cybersecurity landscape.

 

GET THE ACCESS NOW

Catch the Stealth Attack That Leaves No Trace

How do you investigate advanced computer attacks which are stealthy enough to avoid leaving traces on the computer hard drive? You perform digital forensics on the memory dump.

Digital forensics is an advanced cybersecurity skill that big corporations need and are willing to pay for. According to IBM, the average time to identify a computer breach in 2020 was 207 days. Containing the breach then took another 280 days on average, costing companies an average loss of $3.86 million as of 2020*.

In this new, high-impact virtual training, Security MVP Paula Januszkiewicz shows you how to perform digital forensics step by step, from memory collection to memory analysis.

In just 3 hours, you’ll discover how to extract data from memory dumps and develop the advanced digital forensic skills you need to investigate stealthy cyberattacks.

 

*Cost of a Data Breach Report 2021, IBM

 

How is this training different?

Short and Intense

Time is precious, that’s why we squeezed the best from the topic into a format designed to feed you with knowledge in short time. Effective solution designed to maximize learning.

Level: Advanced

You’ll go straight into the deep, advanced stuff. Expect to hit the ground running as we’ll cover: how to use 6 memory capture tools, how to configure an environment, analyze process
activity, and search for hidden processes with memory analysis tools. Brace yourself!

Hands-on Training

The training is extensively hands-on as it has been designed by passionate practitioners and obsessive researchers from CQURE Team.

World-Class Experts

We’re bringing you Paula Januszkiewicz as your teacher.

Training Formula

Intense Deep-dive

New format for busy professionals that enables you to skill up in a specific area quickly.

Action Packed

You’ll learn so many new skills in just 3 hours! Get an over the shoulder look of every step, from capturing a live memory dump to analyzing privileges, detecting process injection, and investigative tools in action.

Full Year Access

You’ll get one year of access to all the materials.

Extra Materials

We’ve prepared slides and video recording for students to keep.

3 Memory Analysis Demos Included

The hackers can’t hide from you anymore! Watch three real-life memory analysis demos to learn how to get important information that gives you the key to investigate advanced cyberattacks.

Training Syllabus

Module 1

Memory Dump Analysis: How to Extract Data from Memory – Volatility & Other Tools

Join Security MVP Paula Januszkiewicz in this unique opportunity to gain advanced cybersecurity skills. Learn how to perform digital forensics step by step, from memory collection to memory analysis, so you’ll have the skills to investigate advanced cyberattacks that are stealthy enough to avoid leaving traces on the computer hard drive.

 

Topics covered:

  1. Digital Forensics: The Purpose
  2. Memory Collection: Techniques
  3. Memory Analysis: Tools
  4. Other Tools
  5. Memory Analysis: Case Studies
  6. Summary

Your teacher

Paula Januszkiewicz

FOUNDER AND CEO OF CQURE

Paula is a Microsoft Security Trusted Advisor, IT Security Auditor and Penetration Tester.

On top of that, she’s an Enterprise Security MVP and trainer (MCT). She shares her expertise on Windows Security through online writing and speaking at conferences (she already checked off TechEd North America, TechEd Europe, TechEd Middle East, RSA, TechDays, CyberCrime — to name but a few). She proudly holds the role of the Security Architect in IDesign and manages her own company CQURE.

Who Is It For

Intermediate to Advanced
Windows Security Professionals

If you want to level up in a specific area fast, this training is for you. We promise to challenge your ways of thinking and executing.

Cybersecurity Specialists

You are: IT professional, Forensics and Incident Handling Specialist, Security Consultant, Infrastructure Architect, Security Professional, Systems Engineer, Network Administrator or a person responsible for implementing network and perimeter security.

Brave Newbies

If you are a newbie bear in mind that the training WILL NOT cover the basics — so it might be a bit challenging for you. The cool thing is that you will be granted lifetime access to the materials so you can learn the topic in your own pace whenever you want.

BENEFITS SUMMARY:

  • Access to 3-hour recorded practical lesson 
  • Training materials to download
  • The virtual training covers: how to use 6 memory capture tools, how to configure an environment, analyze process activity, and search for hidden processes with memory analysis tools.
  • 3 demos included
  • Access to video recording and training materials for one year for you to keep and get back to whenever needed.

GET COMPLETE ACCESS TO
Memory Dump Analysis: How to extract data from memory – volatility & other tools

$299

WATCH NOW

×