Course curriculum

  • 1

    Training: User & System Secrets Cybersecurity Data Extraction

    • How to work with this training.

    • Module 1 - Memory Forensics: The Purpose

    • Module 2 - Memory Collection Techniques

    • Module 3 - Memory Analysis Tools

    • Module 4 - Other Tools

    • Module 5 - Memory Analysis: Case Studies

    • Module 6 - Summary