Introduction to Memory Analysis with Rekall
In today’s app-enabled world it is more important than ever for security practitioners to work with their organization to ensure digital assets are adequately protected against attacks. In most cases, internet-facing applications are the primary targets for attackers. Applications, when not properly hardened and secured, create the entryway for criminals to gain access to sensitive data or even allow for the complete compromise of the underlying system. Whether the application is bought, built or acquired, it is important to consider its vulnerabilities and the types of attacks that might be used to exploit them. This hands-on practical lab will explore the foundations of how to assess an application’s security.
- Lab 1: Requirements Generation
- Lab 2: Attack Surface Analysis
- Lab 3: Abuse Cases
- Lab 4: Threat Modeling
- Lab 5: Vulnerability Analysis
Who Should Take This Course:
Experienced cyber, information, software and infrastructure security professionals who want to better understand the vulnerabilities and the types of attacks that might be used to exploit applications that are bought, built or acquired.
About This Course:
Each module takes you through an interactive exercise, includes an instructional video that introduces key concepts based on specific learning objectives, knowledge checks to ensure understanding, and access to relevant resources. Throughout the course you will be guided to read relevant thought leadership that expands on the concepts and view videos introducing perspectives from the field. The course concludes with a final assessment at the end of the last module. You must score 70% or higher on the final assessment prior to receiving a certificate of completion and earning continuing professional education (CPE) credits.