95% off Surviving Digital Forensics: Memory Analysis 1 (Coupon)

Attention: This post may contain affiliate links, meaning when you click the links and make a purchase, we receive a commission at no extra cost to you. Thanks!

Surviving Digital Forensics: Memory Analysis 1 - Udemy Coupon

Get Discount


Bonus: download a free guide that reveals 11 tricks for getting the biggest discounts on Udemy courses, including this course.

Coupon & course info

Course Name: Surviving Digital Forensics: Memory Analysis 1

Subtitle: Learn how to identify suspicious processes running in Windows memory

Instructor: Taught by Michael Leclair, Computer Forensic Analyst

Category: IT & Software

Subcategory: Network & Security

Provided by: Udemy

Price: $49 (before discount)

Free coupon code: See above (no charge for coupon)

Review info & popularity

As of March 15, 2016…

Students: 474 students enrolled

Ratings: 17 reviews

Rank: ranked #332 in Udemy IT & Software Courses

Brief course description

A system’s memory contains an assortment of valuable forensic data. A computer analyst trained in memory forensics can use this data to determine if a system has been infected with malware – a valuable skill for both incident response triage work as well as in digital forensic exams involving litigation.

This class provides you with the foundation knowledge to help you identify suspicious processes running in memory. Learn how to conduct a “level 1” triage of Windows memory which includes observing running processes and being able to identify suspicious behaviors. Further memory analysis is based on the fundamentals taught here.

(Read more about this course on the official course page.)

Michael Leclair bio

Over twelve years of experience as a Computer Forensic Analyst, author and developer of computer forensic training and analysis tools. Specialties include: Windows forensics, Mac forensics, iOS forensics, Mac Server forensics & mobile device forensics. Creator of the “Surviving Digital Forensics” series and part of SUMURI’s RECON for Mac OS X development team.

(Learn more about this instructor on the official course page.)

Recommended courses

If you like this course, you might also be interested in:


1. CWHH Level 2 – Break the Security ( CWHH-BTS)

Advanced Ethical Hacking, penetration testing, vulnerability assessment, Metasploit intranet hacking, JBOSS hacking

Taught by Cyber Security & Privacy Foundation Pte Ltd


2. Salesforce Development & Administration for Beginners

Complete Training package for both Admin and Developer part of Salesforce CRM

Taught by Aslam Tayyab, Salesforce Developer & Consultant


3. Metasploit Framework for Beginners

Learn how to secure your computer systems by finding vulnerabilities with a very powerfull pentest tool.

Taught by Gökhan OKUMUŞ, System Engineer


4. CCNP Security 300-206_senss With B S Deshwal CCIE 37094

CCNP Security 300-206_senss (Firewall) course is designed by me to make you understand Basic to Professional Level.

Taught by Baldev Singh, Trainer


5. Understand Router commands in 1 hr for CCNA CCNP students

+ EIGRP GNS3 Practical Labs only for YOU

Taught by Ashish Rana, M.Sc, CCNP, ITILv3 Certified Teacher with 10 years Exp.

Final details for this Udemy course

Languages: English

Skill level: All Levels

Lectures: 26 lessons

Duration: 1 Hour of video

What you get: Identify notable windows processes

Target audience: Computer forensic analysts

Requirements: Students need a Windows 7 or Windows 8 system (virtual machine preferred)

Access: Lifetime access

Peace of mind: 30 day money back guarantee

Availability: available online, as well as on iOS and Android

Download options: check course to see if you can download lessons