Please join us for Episode 5 in the series of in-depth IT security webinars presented by World-Renowned Security Expert and Hacker Paula Januszkiewicz on April 21, 2016 at 1:00 PM EST.
Hello Security Enthusiasts!
In the fifth webinar of the 20 Episodes series, Paula will share with you the top useful tips used during her security audits. The goal of the series is to go beyond the major supporting tools presented for everyday administrative tasks, and to feel encouraged in experimenting or creating your own solutions while having fun with technology. This is “Hacking” for the good guys. Enjoy!
Episode 5: Memory Analysis Guide: Part One – Memory Dump: keep it for yourself
If you have already started to wonder why the subject is divided into 3 parts, the reason is pretty simple: memory analysis is such a huge subject that putting everything into one episode will make the webinar last for the whole day! And we still need to work, right?
Acquiring and analyzing physical memory as done by forensic professionals is a skill crucial to understanding how operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. The valuable content contains evidence of user actions, hacker’s tasks, malicious code behaviors, and the story of what happened on a system. Within these 3 parts of memory analysis webinar episodes, you will become familiar with the methods for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone’s memory dump! Don’t miss on this one!
At the end of the webinar, there will be time for questions open to all covering everything discussed.
Take this webinar at no cost and experience the priceless!
After registering, you will receive a confirmation email containing information about joining the webinar.