Free
Analyzing Attacks for Incident Handlers
An important but often overlooked process in incident handling is memory analysis. In this installment of David Biser’s series on incident response, he explains and demonstrates how to use memory analysis to investigate an attack and gain useful evidence from memory that may not otherwise be available.
1
H
21
M
Time
intermediate
difficulty
2
ceu/cpe
Course Content
Introduction to Memory Analysis
Analyzing Attacks for Incident Handlers
Memory Analysis Explanation
Analyzing Attacks for Incident Handlers
Using FTK for Memory Analysis
Analyzing Attacks for Incident Handlers
Lab Introduction
Analyzing Attacks for Incident Handlers
Redline Lab
Analyzing Attacks for Incident Handlers
VM and Malware Lab
Analyzing Attacks for Incident Handlers
Redline Analysis Lab Part 1
Analyzing Attacks for Incident Handlers
Redline Analysis Lab Part 2
Analyzing Attacks for Incident Handlers
Course Description
In Analyzing Attacks for Incident Handlers, David Biser explains memory analysis and how to use it to uncover information about a computer. He demonstrates this process of analyzing an attack using labs such as a Redline lab and a VM and Malware lab to conduct an analysis on a computer.