Cargando…

Supervised machine learning in security applications.

What is this video course about, and why is it important? Today, arguably the most important field in the IT industry is security. With more and more commerce and business being conducted online every day, keeping data safe by detecting and repelling attacks is paramount to every organization. One a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly Media, Inc., [2018]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1348103977
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 221018s2018 xx 155 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d UMI  |d TOH  |d OCLCO 
019 |a 1035765596  |a 1362786845 
020 |a 9781492032410  |q (electronic video) 
020 |a 1492032417  |q (electronic video) 
029 1 |a AU@  |b 000073549731 
035 |a (OCoLC)1348103977  |z (OCoLC)1035765596  |z (OCoLC)1362786845 
037 |a 9781492032410  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23/eng/20221018 
049 |a UAMI 
245 0 0 |a Supervised machine learning in security applications. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b O'Reilly Media, Inc.,  |c [2018] 
300 |a 1 online resource (1 video file (2 hr., 35 min.)) :  |b sound, color. 
306 |a 023500 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Charles Givre, presenter. 
520 |a What is this video course about, and why is it important? Today, arguably the most important field in the IT industry is security. With more and more commerce and business being conducted online every day, keeping data safe by detecting and repelling attacks is paramount to every organization. One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. Indeed, machine learning is being used to defend systems and networks across an increasing range of industries and enterprises, so it's no mystery that there's also an increasing demand for skilled and qualified security specialists who can apply data science techniques to the task of data security. This video course introduces you to machine learning and explains the concept at the core of machine learning, models, and how you "train" them to perform tasks and solve problems. This video course focuses specifically on "supervised" training, or learning, in a security context. Your host, cyber security specialist and data scientist Charles Givre, provides examples and use cases that use real security data and focus on actual applications of machine learning to security problems rather than contrived or superficial datasets. You will see how to build supervised machine learning models, evaluate and optimize their performance, and then apply these models in a security context. You will examine the theory and implementation behind the supervised machine learning techniques most relevant to security, including random forest, support vector machines, and more. This video course is one in a set of three individual ones intended for security professionals who want to learn how to use and apply data science to their toughest security problems. Mr. Givre focuses on the tools and techniques that are directly applicable to the industry, and uses security problems and datasets to walk you through the entire data science process from end-to-end. What you'll learn--and how you can apply it What machine learning is and how it can be useful, particularly in a security setting How to build classification models using techniques, such as support vector machines and random forest, and use them in a security context How to measure the performance of supervised machine learning models by developing metrics and through visualization How to fine-tune your model to get the best possible performance How to apply supervised machine learning techniques in a security setting using security related datasets This video course is for you because... You're a security professional with some scripting skills and you want to apply data science techniques to your work to analyze data more efficiently You're a network analyst with some scripting skills and you want to use machine learning techniques to better secure your network Prerequisites: You should have beginner- to intermediate-level experience with the Python programming language You should be familiar with security and networking concepts You should be generally familiar with basic statistical concepts Materials or downloads needed in advance: Students are encouraged to use the Griffon Virtual Machine for Data Science, which is available at https://github.com/gtkcyber/griffon-vm. (Griffon is a virtual machine with all data sources and all tools preconfigured) Students should have access to a computer with at least 8 GB of RAM and 20 to 30 GB of hard drive space. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed October 18, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Machine learning. 
650 0 |a Computer security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Apprentissage automatique. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Machine learning  |2 fast 
655 7 |a Instructional films  |2 fast 
655 7 |a Internet videos  |2 fast 
655 7 |a Nonfiction films  |2 fast 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Givre, Charles,  |e presenter. 
710 2 |a O'Reilly (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781492032410/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP