Advent of Cyber 2025

Daily festive challenges and 30% off annual subscriptions

08days
:
04hr
:
28min
:
37sec
Subscribe now
Back to all modules

Memory Analysis

Memory Analysis icon

Learn how to analyse volatile memory to detect suspicious activity, track user behaviour, and investigate network threats through hands-on labs.

In this module, we'll learn how to investigate volatile memory to uncover signs of suspicious behaviour, hidden programs, user activity, and potential security threats. We will explore how memory stores valuable information about running programs, system usage, and network interactions that often disappear after shutdown. Through guided practice and real scenarios, we'll develop the skills to identify unusual patterns, trace actions taken on a system, and connect the dots to understand what happened. Each step combines clear explanations with practical exercises using the Volatility Framework to build confidence and prepare us for real investigation work.

Memory Analysis icon

We use cookies to ensure you get the best user experience. For more information contact us.

Read more