Memory forensics can be very simple, or very very hard. Luckily, some awesome folks made a tool named Volatility which makes the easy things very easy.
Using a combination of this CTFd site: https://defcon2019.ctfd.io/challenges
The files hosted at this link: https://www.dropbox.com/sh/4qfk1miauqbvqst/AAAVCI1G8Sc8xMoqK_TtmSbia?dl=0&preview=Adam+Ferrante+-+Triage-Memory.mem
And this walkthrough: https://blog.1234n6.com/2019/08/2019-unofficial-defcon-dfir-ctf-writeup_14.html
Work through all the problems in the CTF. Submit screenshots of your answers for "get your volatility on", "lm-get bobs hash", and a brief writeup of how "whats-a-metasploit" works.