강의

멘토링

커뮤니티

BEST
Security & Network

/

Computer Security

Memory forensics for malware analysis

You can understand the Windows operating system structure and memory structure, and it covers in detail how to analyze malware using information stored in memory. It also covers how to directly create a Volatility plugin that is used as a memory analysis tool and achieve important information acquisition. It is highly recommended for those who have chosen a career as a malware analyst or a breach response analyst.

(4.6) 35 reviews

441 learners

Level Beginner

Course period Unlimited

  • boanproject
Malware
Malware
Forensic
Forensic
Malware
Malware
Forensic
Forensic

Memory forensics for malware analysis - Added breach incident case analysis

Section 11. Breach Incident Case Analysis (2019 Update) has been updated to include a case of memory analysis of a breach incident analysis case.

We will regularly analyze and update cases of web service penetration, application penetration, and system penetration.

Comment