This is a dedicated watch page for a single video.
An attack left several Amazon EC2 Windows instances unresponsive. A security engineer has been asked to collect any memory dumps that may exist on the EC2 instances attached Amazon EBS volumes. How should the security collect memory dumps for forensic analysis?