Course Curriculum

(W00) Course Instructions 00:00:00
Module 1: Introduction to Volatility
(W28M01) Lab setup instructions 00:00:00
(W28M02) Module 1 Video 00:00:00
(W28M03) Module notes 00:00:00
(W28M04) Memory image downloads 00:00:00
(W28A01) Module 1 Exercises 30, 00:00
(W28A02) Module 1 Bonus Challenge 30, 00:00
Module 2: The architecture of the GUI Windows system from the forensics point of view
(W28M06) Module 2 Video 00:00:00
(W28M07) Module 2 notes 00:00:00
(W28M08) Memory image downloads 00:00:00
(W28A03) Module 2 Exercises Part I 30, 00:00
(W28A04) Module 2 Exercises Part II 30, 00:00
Module 3: Nefarious actions under the Windows architecture
(W28M00) Module 3 Disclaimer 00:00:00
(W28M11) Module 3 Video: Volatility plugins practice in Windows 00:00:00
(W28M12) Module 3 Video - Volatility plugins practice in Linux 00:00:00
(W28M13) Module 3 notes 00:00:00
(W28M14) Memory Image Downloads 00:00:00
(W28A05) Module 3 Practice Exercises 30, 00:00
(W28A06) Module 3 Practical Lab Scenario 30, 00:00
Module 4: The malicious intelligence from behind the instruction codes and the artifacts in memory
(W28M17) Module 4 Lecture 00:00:00
(W28M18) Module 4 Demonstration Video 00:00:00
(W28M19) Module 4 Notes 00:00:00
(W28M20) Memory image downloads 00:00:00
(W28A07) Module 4 Exercises (Plugins Practice) 30, 00:00
(W28A08) Module 4 Practical Lab 30, 00:00
eBook
(W28M23) Workshop eBook 00:00:00
Quiz
(W28) Final quiz 00:30:00
(W28M24) The Finish Line 00:00:00
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023