How to Make Sure Your Data Science Isn't Vulnerable to Attack

How to Make Sure Your Data Science Isn't Vulnerable to Attack

BSidesLV via YouTube Direct link

Naming conventions

9 of 31

9 of 31

Naming conventions

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

How to Make Sure Your Data Science Isn't Vulnerable to Attack

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is data science
  3. 3 Data exploration preparation principles
  4. 4 Applying the algorithms
  5. 5 Communication
  6. 6 Machine Learning
  7. 7 Strong Foundations
  8. 8 Measure
  9. 9 Naming conventions
  10. 10 Detect
  11. 11 Analysis
  12. 12 New detection
  13. 13 New vulnerabilities
  14. 14 Metadata
  15. 15 Data quirks
  16. 16 Check new detection
  17. 17 How to communicate
  18. 18 Data flow in infosec
  19. 19 Balance between caveats and usability
  20. 20 Different perspectives on the data
  21. 21 Vulnerability assets
  22. 22 Actual insight
  23. 23 Actionable insight
  24. 24 Beyond your data set
  25. 25 Other data sets
  26. 26 Get more data
  27. 27 The takeaway
  28. 28 Importance of basic statistics
  29. 29 Common mistakes
  30. 30 Lessons learned
  31. 31 Measuring risk

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.