NOTE Separate registration required.
Analysts in the class will be taught practical memory analysis by learning about common memory structures and acquisition; Identifying rogue or hidden processes, lateral network movement, and interesting process strings; extracting artifacts of interest for Incident Response utilizing tools such as bulk_extractor, Volatility and Rekall.
Please note: It is necessary to fully update your host operating system prior to the class to ensure you have the right drivers and patches installed to utilize the latest USB 3.0 devices. Those who use a Linux host must also be able to access ExFAT partitions using the appropriate kernel or FUSE modules.
Dan Cao is an Incident Handler on Target’s Cyber Security Incident Response Team. Dan has domain knowledge in Incident Response, Memory Forensics, and Network Forensics. In addition to his passion for Cyber Security, Dan is also passionate about gaming, motorcycles, photography and baseball.
Ryan Eikanger is an Incident Handler with Target’s Cyber Security Incident Response Team. Ryan specializes in forensics, live response, and memory analysis.