This event will be the 5th public offering of the Windows Malware and Memory Forensics Training by The Volatility Project. This is the only memory forensics course officially designed, sponsored, and taught by the Volatility developers. One of the main reasons we made Volatility open-source is to encourage and facilitate a deeper understanding of how memory analysis works, where the evidence originates, and how to interpret the data collected by the framework's extensive set of plugins. Now you can learn about these benefits first hand from the developers of the most powerful, flexible, and innovative memory forensics tool.
Dates: Monday, November 11th through Friday, November 15th 2013
Location: Reston, VA (exact location will be shared upon registration)
Instructors: Michael Ligh (@iMHLv2), Andrew Case (@attrc), Jamie Levy (@gleeda)
For more information about the course, view the Volatility Training Flyer (to download a copy of the PDF, click File > Download). To request a link to the online registration site or to receive a detailed course agenda/outline, please send an email voltraining [[ at ]] memoryanalysis.net.
Curious what our past attendees have been saying about the class? Here are some testimonials from our recent class in Reston:
"One of the best technical classes I've taken in 10 years" - Rich M. (HP)
"Excellent memory forensics training. Definitely would recommend it to anyone in DFIR or malware analysis" - Q.M. (McAfee)
"Realistic labs and the one-on-one instruction make the entire class worth it. Everything else is icing" - Anonymous
"Super technical and awesome" - Sarah E. (Harris)
"Best forensic and winternal training I've ever experienced. Raises the bar really high" - Lance B.
"This is as valuable an education as any of you have had in your career" - Ash K. (Intersections)
"Great, great course. Most malware classes out there walk through analysis of some IRC bot from the 90's and call it good. This was an excellent trip into modern, highly sophisticated malware and gave real methodologies to quickly analyze them" - Brian H. (Harris)
No comments:
Post a Comment