Memory Forensics

This intensive 3-day course equips cybersecurity professionals with the foundational and practical skills required to master memory forensics on modern systems. Through guided labs and structured analysis exercises, participants will learn how volatile memory reveals critical evidence in live attacks, malware infections, and advanced threat activity.

The training begins with core concepts such as memory architecture, process structures, and virtual address spaces, then progresses into real-world investigations using memory dumps from Windows and Linux systems. Students will explore how modern threats leverage in-memory techniques like code injection, credential dumping, and stealthy persistence mechanisms.

Participants will gain hands-on experience with industry-standard tools, and modern frameworks for timeline reconstruction and threat hunting in memory. Special emphasis is placed on malware behavior, unpacking techniques, and detecting signs of fileless attacks that bypass traditional disk-based forensics.

By the end of the course, students will confidently extract forensic artifacts, identify indicators of compromise (IOCs), and reconstruct attacker behavior solely from memory dumps. This course bridges low-level memory analysis with real-world incident response, making it essential for DFIR professionals, threat hunters, and security teams focused on modern post-exploitation detection.

Course curriculum

    1. Day 1 Memory Forensics

    2. Day 2 Memory Forensics

    3. Day 3 Memory Forensics

About this course

  • 3 lessons
  • 4 hours of video content

Requirements

While not mandatory, it is recommended that participants have the following tools installed to fully engage with the hands-on exercises:

  • Tsurugi OS VM
  • Windows OS VM

These tools will enhance your ability to work effectively with the course materials and practical exercises.