Our cutting edge materials are one of the main reasons students value our course. We don't teach the same concepts year after year. Instead, we update our class regularly, to stay in sync with (and in some cases, ahead of) the rapidly changing attack surfaces, advances in defense technologies, malware hiding tricks, and operating system forensics artifacts. A few recent additions include:
- Windows 10 security features, such as Device Guard, Credential Guard, Isolated User Mode, Protected Processes, etc.
- Challenges of recent hibernation file analysis, the impact of new sleep modes, and hybrid style hibernations
- How to analyze RAM backed page files on Windows 10 & memory compression
- The Linux subsystem of Windows 10 and the associated memory artifacts
- Memory-only Powershell and .NET based attacks
- New event log sources that compliment memory forensics
Not only only will you be learning these memory forensics topics directly from the authors of the Volatility Framework and the Art of Memory Forensics, but you will also receive Volatility stickers, a branded USB drive, a copy of the Art of Memory Forensics (digital or print), and various opportunities to win SyncStops - all nicely documented by a former student:
One of the most popular class contests is our CTF that pits individuals (or teams of two) against the rest of the class, in a challenge that involves analyzing Windows and Linux memory samples in a scenario resembling events that unfolded during the 2016 U.S. Presidential Election.Loving the swag, particularly the SyncStop. Thanks @volatility team! pic.twitter.com/GEYGcGSN0P— me (@cyli) February 8, 2016
To continue providing the most up-to-date memory forensics training available anywhere in the world, our instructors constantly perform high impact, real-world DFIR (1, 2, 3, 4, 5). The knowledge gained during these investigation is immediately transitioned into content and labs for our training courses:Another epic memory analysis CTF battle between @volatility training students. Congrats to the winners! #DFIR pic.twitter.com/1caH6oGMy9— volatility (@volatility) April 7, 2017
Extracting&analyzing this log file from memory is required to complete 1 of our memory forensics labs. Has been crucial in many real cases https://t.co/YU1hOzIITr— Andrew Case (@attrc) March 17, 2017
Besides the core knowledge needed to perform effective memory forensics, we also teach the latest tools and techniques for reliable memory acquisition. Students will gain experience using Volexity Surge Collect Pro for robust, fast, and secure collection of Windows memory to local and remote/network-based destinations. Students can purchase Surge licenses at a discounted price during course registration (see Memory Forensics Training FAQ) or separately after the class.Detecting each of these with memory forensics is covered in full detail in our @volatility training #dfir https://t.co/UOcMRBDhaL— Andrew Case (@attrc) May 28, 2017
In closing this update, we would again like to thank the DFIR community for its continued support of the Volatility project and our associated training course. In particular, all the newcomers who are just starting to explore memory analysis, as well as our alumni and numerous repeat students who just can't get enough!
On a side note, if you are going to be at DFRWS or Black Hat this summer then be sure to come introduce yourself!
-- The Volatility Team
Post a Comment