Memory Forensics

This intensive 3-day course equips cybersecurity professionals with the foundational and practical skills required to master memory forensics on modern systems. Through guided labs and structured analysis exercises, participants will learn how volatile memory reveals critical evidence in live attacks, malware infections, and advanced threat activity.

The training begins with core concepts such as memory architecture, process structures, and virtual address spaces, then progresses into real-world investigations using memory dumps from Windows and Linux systems. Students will explore how modern threats leverage in-memory techniques like code injection, credential dumping, and stealthy persistence mechanisms.

Participants will gain hands-on experience with industry-standard tools, and modern frameworks for timeline reconstruction and threat hunting in memory. Special emphasis is placed on malware behavior, unpacking techniques, and detecting signs of fileless attacks that bypass traditional disk-based forensics.

By the end of the course, students will confidently extract forensic artifacts, identify indicators of compromise (IOCs), and reconstruct attacker behavior solely from memory dumps. This course bridges low-level memory analysis with real-world incident response, making it essential for DFIR professionals, threat hunters, and security teams focused on modern post-exploitation detection.

Course curriculum

    1. Introduction

    2. Types of Volatile Data

    3. Acquisition Best Practices

    4. Memory Acquisition on Windows

    5. Memory Acquisition on Linux

    6. Sysinternals Suite

    7. Network Artifacts and Detection Strategies for Hidden Processes

    8. Analysis with Autopsy Part I

    9. Analysis with Autopsy Part II

    10. Volatility Part I

    11. Volatility Part II

    12. Volatility Part III

    13. Yara Rules

    14. Yara Rules and Volatility

About this course

  • 14 lessons
  • 5 hours of video content

Requirements

While not mandatory, it is recommended that participants have the following tools installed to fully engage with the hands-on exercises:

  • Tsurugi OS VM
  • Windows OS VM

These tools will enhance your ability to work effectively with the course materials and practical exercises.