Jump to content

Search the Community

Showing results for tags 'FOR526'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 2 results

  1. Evolving Evasion Capabilities Foil Traditional Forensics System memory is today's battleground for host integrity. Novel defense evasion and bypass techniques seen in modern malware continue to outpace host protections and ensure few artifacts are left behind for examiners to piece together. Hunters must have an understanding of OS memory internals in order to detect and analyze adversary behavior. FOR526: Advanced Memory Forensics and Threat Detection has advanced the investigative skills of hundreds of seasoned security professionals over the years, instilling critical knowledge of operating system internals with the practical application of memory acquisition and analysis skills. We are proud to have served in training some of the most skilled technicians in the field today. FOR526 Re-Booted: The newest version of this six-day bootcamp course, the FOR526 Re-Boot, focuses on modern multiplatform enterprise investigations and incorporates real-world, malware and artifact-laden images from system and process memory. We tackle more challenging fileless malware attacks, memory-only, LOLBin and script-based, that require more advanced analysis techniques. Investigative scenarios include acquisition and analysis of targets with security mitigations and OS optimizations such as system integrity protection and memory compression making use of varied tools and methods. Each day's content is augmented with a bootcamp scoring server tournament, allowing the opportunity to practice analysis concepts and build muscle memory. The final Capstone Challenge provides each student a virtual range enterprise to investigate, requiring live memory acquisition and analysis of compromised hosts. FOR526 provides the critical skills necessary for digital forensics examiners and incident responders to successfully perform live system memory triage and analyze captured memory images from Windows, macOS and Linux hosts. The course uses the most effective freeware and open-source tools in the industry today and provides an in-depth understanding of how these tools work. FOR526 is a critical course for any serious security professional who wishes to gain a deeper understanding of the footprint of code execution and adversary tactics in memory. FOR526: Advanced Memory Analysis & Threat Detection will teach you: Multi-platform Enterprise Memory Acquisition & Analysis: Demonstrate targeted memory capture based on target OS and incident circumstance to ensure data integrity and fidelity. How to Find Evil in Memory: Detect rogue, hidden, and injected processes, kernel-level rootkits, Dynamic Link Libraries (DLL) hijacking, process hollowing, and sophisticated persistence mechanisms. Effective Step-by-Step Memory Analysis Techniques: Use process timelining, high-low-level analysis, and walking the Virtual Address Descriptors (VAD) tree to spot anomalous behavior. Best Practice Techniques: Learn when to implement triage, live system analysis, and alternative acquisition techniques, as well as how to devise custom parsing scripts for targeted memory analysis. Course Syllabus FOR526.1: Foundations in Memory Analysis and Acquisition FOR526.2: Unstructured Analysis and Process Exploration FOR526.3: Malicious Code Detection Methods FOR526.4: Memory Analysis with Windows Debugger FOR526.5: macOS Investigations and Rootkit Detection FOR526.6: Memory Analysis Challenges Links: [hide][Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  2. FOR526: Advanced Memory Forensics & Threat Detection Evolving Evasion Capabilities Foil Traditional Forensics System memory is today's battleground for host integrity. Novel defense evasion and bypass techniques seen in modern malware continue to outpace host protections and ensure few artifacts are left behind for examiners to piece together. Hunters must have an understanding of OS memory internals in order to detect and analyze adversary behavior. FOR526: Advanced Memory Forensics and Threat Detection has advanced the investigative skills of hundreds of seasoned security professionals over the years, instilling critical knowledge of operating system internals with the practical application of memory acquisition and analysis skills. We are proud to have served in training some of the most skilled technicians in the field today. [Hidden Content]
×
×
  • Create New...