This online course explains how to determine whether a Windows system
is infected with malware. It covers the tools that computer forensics
practitioners use to examine a system, build a timeline of events and
preserve the state of the system or data they are examining. Common
malware attachment points in the Windows operating system are also described.
After completing this course, learners should be able to:
- Describe processes and tools used for the preservation of
- Create and preserve disk images
common methods of malware infection
- Describe basic file
- Understand general investigative
- Describe malware artifacts on the Windows OS
Who Should Attend
Any FireEye customer.
Background in computer science recommended but not required.
This course includes animation with audio narration and requires
Adobe Flash Player and speakers or headphones.
- Initial Incident Response Processes and Preservation of
- Preserving Memory
- Creating and Preserving
- Common Methods of Malware
- Investigative Techniques