Introduction to Memory Forensics

Everything you need to get started with memory forensics

Memory Forensics is a required skill for digital analysts these days; it is also a needed in order to keep up with advanced attackers. In addition to attackers avoiding disk, thousands of nodes and BYOD are increasing the complexity of investigations. Gone are the days when an analyst could examine one machine at a time- results must be quick and precise. Oftentimes if you are not proactive, you’ve already lost the war before you even knew it was raging.

This course will level the playing board for those who want to quickly triage and investigate infected machines in their enterprise.


Your Instructor


Jamie Levy
Jamie Levy

Jamie Levy is a senior researcher, developer and board member of the Volatility Foundation. She worked on various R&D projects and forensic cases while previously working at Guidance Software, Inc, and later at Verizon Terremark. Jamie has taught classes in Computer Forensics and Computer Science at Queens College (CUNY) and John Jay College (CUNY). She has a Masters in Forensic Computing from John Jay College and is an avid contributor to the open source Computer Forensics community. She is an active developer on the Volatility Framework. Jamie has lead large scale threat hunting engagements for over 10 years. She currently works as a software developer, using her previous knowledge in order to empower investigators to quickly triage and remediate machines on their network.

Jamie has authored peer-reviewed conference publications, and presented at conferences (OMFW, CEIC, IEEE ICC, EnFuse, ACSAC, NYBA, HTCIA, Lockdown, OSDFCon and others) on the topics of memory, network, and malware forensics analysis. Jamie is a well respected member of the DFIR community, sits on the board of directors for the Volatility Foundation, and has served on the program committee for such conferences as DFRWS, BSidesNYC and IWCMC Security Conference (among others). Jamie is also a trainer on the topics of Digital Forensics and Incident Response for the Volatility Project and Black Hat USA.


Frequently Asked Questions


When does the course start and finish?
The course starts whenever you want and you have 2 years to complete it once started. It is a completely self-paced online course.
How long do I have access to the course?
2 years. After enrolling, you have access to this course and updates for 2 years - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 15 days and we will give you a full refund.

Get started now!