Cargando…

Unsupervised machine learning in security applications.

What is this video course about, and why is it important? Today, arguably the most important field in the IT industry is security. With more and more commerce and business being conducted online every day, keeping data safe by detecting and repelling attacks is paramount to every organization. One a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly Media, Inc., [2018]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1348104631
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 221018s2018 xx 055 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d UMI  |d OCLCO 
019 |a 1035765595  |a 1362788452 
020 |a 9781492032373  |q (electronic video) 
020 |a 1492032379  |q (electronic video) 
029 1 |a AU@  |b 000073549397 
035 |a (OCoLC)1348104631  |z (OCoLC)1035765595  |z (OCoLC)1362788452 
037 |a 9781492032373  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23/eng/20221018 
049 |a UAMI 
245 0 0 |a Unsupervised machine learning in security applications. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b O'Reilly Media, Inc.,  |c [2018] 
300 |a 1 online resource (1 video file (55 min.)) :  |b sound, color. 
306 |a 005500 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Charles Givre, presenter. 
520 |a What is this video course about, and why is it important? Today, arguably the most important field in the IT industry is security. With more and more commerce and business being conducted online every day, keeping data safe by detecting and repelling attacks is paramount to every organization. One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. Indeed, machine learning is being used to defend systems and networks across an increasing range of industries and enterprises, so it's no mystery that there's also an increasing demand for skilled and qualified security specialists who can apply data science techniques to the task of data security. This video course introduces you to the concept "unsupervised" model training, or learning, in a security context. Your host, cyber security specialist and data scientist Charles Givre, explains the theory behind commonly used clustering algorithms such as K-means and DBSCAN as well as the direct application to security problems such as anomaly detection. You'll see how to pipeline your models into a production environment using the Python scikit-learning library. You'll also learn how to calculate metrics to assess your models' performance, and how to use Yellowbrick to create visualizations of those performance evaluations. This video course is one in a set of three individual ones intended for security professionals who want to learn how to use and apply data science to their toughest security problems. Mr. Givre focuses on the tools and techniques that are directly applicable to the industry, and uses security problems and datasets to walk you through the entire data science process from end-to-end. What you'll learn--and how you can apply it The mechanics of several commonly used clustering algorithms such as K-means and DBSCAN How to reduce the dimensions of large datasets using Principal Component Analysis Understanding how to evaluate the performance of unsupervised techniques when possible Using Yellowbrick to produce visualizations of performance evaluations Applying unsupervised learning techniques to security problems such as detecting anomalies This video course is for you because... You're a security professional with some scripting skills and you want to apply data science techniques to your work to analyze data more efficiently You're a network analyst with some scripting skills and you want to use machine learning techniques to better secure your network Prerequisites: You should have beginner- to intermediate-level experience with the Python programming language You should be familiar with security and networking concepts You should be generally familiar with basic statistical concepts Materials or downloads needed in advance: Students are encouraged to use the Griffon Virtual Machine for Data Science, which is available at https://github.com/gtkcyber/griffon-vm. (Griffon is a virtual machine with all data sources and all tools preconfigured) Students should have access to a computer with at least 8 GB of RAM and 20 to 30 GB of hard drive space. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed October 18, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Machine learning. 
650 0 |a Computer security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Apprentissage automatique. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Machine learning  |2 fast 
655 7 |a Instructional films  |2 fast 
655 7 |a Internet videos  |2 fast 
655 7 |a Nonfiction films  |2 fast 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Givre, Charles,  |e presenter. 
710 2 |a O'Reilly (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781492032373/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP