|
(W00) Course Instructions |
|
00:00:00 |
Module 1: Introduction to Volatility |
|
(W28M01) Lab setup instructions |
|
00:00:00 |
|
(W28M02) Module 1 Video |
|
00:00:00 |
|
(W28M03) Module notes |
|
00:00:00 |
|
(W28M04) Memory image downloads |
|
00:00:00 |
|
(W28A01) Module 1 Exercises |
30, 00:00 |
|
(W28A02) Module 1 Bonus Challenge |
30, 00:00 |
Module 2: The architecture of the GUI Windows system from the forensics point of view |
|
(W28M06) Module 2 Video |
|
00:00:00 |
|
(W28M07) Module 2 notes |
|
00:00:00 |
|
(W28M08) Memory image downloads |
|
00:00:00 |
|
(W28A03) Module 2 Exercises Part I |
30, 00:00 |
|
(W28A04) Module 2 Exercises Part II |
30, 00:00 |
Module 3: Nefarious actions under the Windows architecture |
|
(W28M00) Module 3 Disclaimer |
|
00:00:00 |
|
(W28M11) Module 3 Video: Volatility plugins practice in Windows |
|
00:00:00 |
|
(W28M12) Module 3 Video - Volatility plugins practice in Linux |
|
00:00:00 |
|
(W28M13) Module 3 notes |
|
00:00:00 |
|
(W28M14) Memory Image Downloads |
|
00:00:00 |
|
(W28A05) Module 3 Practice Exercises |
30, 00:00 |
|
(W28A06) Module 3 Practical Lab Scenario |
30, 00:00 |
Module 4: The malicious intelligence from behind the instruction codes and the artifacts in memory |
|
(W28M17) Module 4 Lecture |
|
00:00:00 |
|
(W28M18) Module 4 Demonstration Video |
|
00:00:00 |
|
(W28M19) Module 4 Notes |
|
00:00:00 |
|
(W28M20) Memory image downloads |
|
00:00:00 |
|
(W28A07) Module 4 Exercises (Plugins Practice) |
30, 00:00 |
|
(W28A08) Module 4 Practical Lab |
30, 00:00 |
eBook |
|
(W28M23) Workshop eBook |
|
00:00:00 |
Quiz |
|
(W28) Final quiz |
|
00:30:00 |
|
(W28M24) The Finish Line |
|
00:00:00 |