Completed
Adversarial ML Use-cases
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
InfoSec Deep Learning in Action
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 It is all about Money !!
- 3 Information Security Problem
- 4 Basic Security Controls
- 5 Security Data Sources: Network Logs
- 6 Endpoint Logs and Use Cases
- 7 Authentication Logs and Use Cases
- 8 Step 2: Compute Statistics
- 9 Step 3: Anomaly Detection
- 10 Example 2: Malware Detection
- 11 Feed Forward Neural Network
- 12 Command and Control Detection
- 13 Recurrent Neural Network
- 14 Adversarial ML Use-cases