
Level: Intermediate
Duration: 64 hours
Table of Content:
- Introduction
- Lab Setup
- Cyber Attack Operations
- Memory Threat Hunting on Windows
- Memory Threat Hunting on Linux
- Common Application Forensics
- Linux Forensics
- Miscellaneous
A blog about malware analysis, reverse engineering, programming and Windows internals.
Level: Intermediate
Duration: 64 hours
Table of Content: