Course Curriculum

(W00) Course Instructions 00:00:00
Module 1: Introduction to Volatility
(W28M01) Lab setup instructions 00:00:00
(W28M02) Module 1 Video 00:00:00
(W28M03) Module notes 00:00:00
(W28M04) Memory image downloads 00:00:00
(W28A01) Module 1 Exercises 30, 00:00
(W28A02) Module 1 Bonus Challenge 30, 00:00
Module 2: The architecture of the GUI Windows system from the forensics point of view
(W28M06) Module 2 Video 00:00:00
(W28M07) Module 2 notes 00:00:00
(W28M08) Memory image downloads 00:00:00
(W28A03) Module 2 Exercises Part I 30, 00:00
(W28A04) Module 2 Exercises Part II 30, 00:00
Module 3: Nefarious actions under the Windows architecture
(W28M00) Module 3 Disclaimer 00:00:00
(W28M11) Module 3 Video: Volatility plugins practice in Windows 00:00:00
(W28M12) Module 3 Video - Volatility plugins practice in Linux 00:00:00
(W28M13) Module 3 notes 00:00:00
(W28M14) Memory Image Downloads 00:00:00
(W28A05) Module 3 Practice Exercises 30, 00:00
(W28A06) Module 3 Practical Lab Scenario 30, 00:00
Module 4: The malicious intelligence from behind the instruction codes and the artifacts in memory
(W28M17) Module 4 Lecture 00:00:00
(W28M18) Module 4 Demonstration Video 00:00:00
(W28M19) Module 4 Notes 00:00:00
(W28M20) Memory image downloads 00:00:00
(W28A07) Module 4 Exercises (Plugins Practice) 30, 00:00
(W28A08) Module 4 Practical Lab 30, 00:00
eBook
(W28M23) Workshop eBook 00:00:00
Quiz
(W28) Final quiz 00:30:00
(W28M24) The Finish Line 00:00:00
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.