95% off Surviving Digital Forensics: Memory Analysis 2 (Coupon)

Attention: This post may contain affiliate links, meaning when you click the links and make a purchase, we receive a commission at no extra cost to you. Thanks!

Surviving Digital Forensics: Memory Analysis 2 - Udemy Coupon

Get Discount


Bonus: download a free guide that reveals 11 tricks for getting the biggest discounts on Udemy courses, including this course.

Coupon & course info

Course Name: Surviving Digital Forensics: Memory Analysis 2

Subtitle: Learn how to identify suspicious processes running in Windows memory

Instructor: Taught by Michael Leclair, Computer Forensic Analyst

Category: IT & Software

Subcategory: Network & Security

Provided by: Udemy

Price: $49 (before discount)

Free coupon code: See above (no charge for coupon)

Review info & popularity

As of March 15, 2016…

Students: 363 students enrolled

Ratings: 7 reviews

Rank: ranked #301 in Udemy IT & Software Courses

Brief course description

A system’s memory contains an assortment of valuable forensic data. A computer analyst trained in memory forensics can use this data to determine if a system has been infected with malware – a valuable skill for both incident response triage work as well as in digital forensic exams involving litigation.

This class picks up where Memory Analysis 1 left off. It provides you with hands on training working with an infected sample of memory. Learn to identify suspicious processes running in memory by putting a “level 1” triage of Windows memory into action. Using key volatility plugins, this class walks you through the process of the exam.

(Read more about this course on the official course page.)

Michael Leclair bio

Over twelve years of experience as a Computer Forensic Analyst, author and developer of computer forensic training and analysis tools. Specialties include: Windows forensics, Mac forensics, iOS forensics, Mac Server forensics & mobile device forensics. Creator of the “Surviving Digital Forensics” series and part of SUMURI’s RECON for Mac OS X development team.

(Learn more about this instructor on the official course page.)

Recommended courses

If you like this course, you might also be interested in:


1. Windows Server 2012 R2 – Preparation to exam 70-410

Gain MCSA or MCSE title, This course covers everything you need to pass the Microsoft Exam 70-410

Taught by Educativo Trainings, New e-learning quality


2. SQL Developer – SQL without Typing

Learn how to perform SQL operations without writing the SQL using SQL Developer Graphical User Interface(GUI)

Taught by Amarnath Reddy, Oracle Architect


3. Grow Your Audience by Building Your own Roku Video Channel

Learn to create your own customized Roku Channel using an easy to follow template and Roku Channel Developer’s guide.

Taught by Gary Venrooy, Roku Developer & Clickbank, Amazon, eBay Entrepreneur


4. CCNA Security Real World Labs – Cisco ASA, Network Security

Identify, lock down, and secure vulnerabilities in a small to medium enterprise branch network – real world training

Taught by Marious Kuriata, IT Exam Practice, Network Engineer and Instructor


5. Raspberry Pi Projects : Build a Media Centre Computer

Learn how to build an incredibly low cost, but powerful, media centre computer to handle your TV, movies, photos & music

Taught by Chris O’Connor, WordPress Expert, Author, and Raspberry Pi Enthusiast

Final details for this Udemy course

Languages: English

Skill level: All Levels

Lectures: 23 lessons

Duration: 1 Hour of video

What you get: Learn how to set up and use Volatility on a Windows system

Target audience: Computer Forensic Analysts

Requirements: Students need a Win7 or Win8 system (VM preferred)

Access: Lifetime access

Peace of mind: 30 day money back guarantee

Availability: available online, as well as on iOS and Android

Download options: check course to see if you can download lessons

95% off Surviving Digital Forensics: Memory Analysis 1 (Coupon)

Attention: This post may contain affiliate links, meaning when you click the links and make a purchase, we receive a commission at no extra cost to you. Thanks!

Surviving Digital Forensics: Memory Analysis 1 - Udemy Coupon

Get Discount


Bonus: download a free guide that reveals 11 tricks for getting the biggest discounts on Udemy courses, including this course.

Coupon & course info

Course Name: Surviving Digital Forensics: Memory Analysis 1

Subtitle: Learn how to identify suspicious processes running in Windows memory

Instructor: Taught by Michael Leclair, Computer Forensic Analyst

Category: IT & Software

Subcategory: Network & Security

Provided by: Udemy

Price: $49 (before discount)

Free coupon code: See above (no charge for coupon)

Review info & popularity

As of March 15, 2016…

Students: 474 students enrolled

Ratings: 17 reviews

Rank: ranked #332 in Udemy IT & Software Courses

Brief course description

A system’s memory contains an assortment of valuable forensic data. A computer analyst trained in memory forensics can use this data to determine if a system has been infected with malware – a valuable skill for both incident response triage work as well as in digital forensic exams involving litigation.

This class provides you with the foundation knowledge to help you identify suspicious processes running in memory. Learn how to conduct a “level 1” triage of Windows memory which includes observing running processes and being able to identify suspicious behaviors. Further memory analysis is based on the fundamentals taught here.

(Read more about this course on the official course page.)

Michael Leclair bio

Over twelve years of experience as a Computer Forensic Analyst, author and developer of computer forensic training and analysis tools. Specialties include: Windows forensics, Mac forensics, iOS forensics, Mac Server forensics & mobile device forensics. Creator of the “Surviving Digital Forensics” series and part of SUMURI’s RECON for Mac OS X development team.

(Learn more about this instructor on the official course page.)

Recommended courses

If you like this course, you might also be interested in:


1. CWHH Level 2 – Break the Security ( CWHH-BTS)

Advanced Ethical Hacking, penetration testing, vulnerability assessment, Metasploit intranet hacking, JBOSS hacking

Taught by Cyber Security & Privacy Foundation Pte Ltd


2. Salesforce Development & Administration for Beginners

Complete Training package for both Admin and Developer part of Salesforce CRM

Taught by Aslam Tayyab, Salesforce Developer & Consultant


3. Metasploit Framework for Beginners

Learn how to secure your computer systems by finding vulnerabilities with a very powerfull pentest tool.

Taught by Gökhan OKUMUŞ, System Engineer


4. CCNP Security 300-206_senss With B S Deshwal CCIE 37094

CCNP Security 300-206_senss (Firewall) course is designed by me to make you understand Basic to Professional Level.

Taught by Baldev Singh, Trainer


5. Understand Router commands in 1 hr for CCNA CCNP students

+ EIGRP GNS3 Practical Labs only for YOU

Taught by Ashish Rana, M.Sc, CCNP, ITILv3 Certified Teacher with 10 years Exp.

Final details for this Udemy course

Languages: English

Skill level: All Levels

Lectures: 26 lessons

Duration: 1 Hour of video

What you get: Identify notable windows processes

Target audience: Computer forensic analysts

Requirements: Students need a Windows 7 or Windows 8 system (virtual machine preferred)

Access: Lifetime access

Peace of mind: 30 day money back guarantee

Availability: available online, as well as on iOS and Android

Download options: check course to see if you can download lessons