Course curriculum
-
1
Training: User & System Secrets Cybersecurity Data Extraction
-
How to work with this training.
-
Module 1 - Memory Forensics: The Purpose
-
Module 2 - Memory Collection Techniques
-
Module 3 - Memory Analysis Tools
-
Module 4 - Other Tools
-
Module 5 - Memory Analysis: Case Studies
-
Module 6 - Summary
-