Completed
Data Sources: CVE Enrichment Projects
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Those Don't Matter! Effective Prioritization Through Exploit Prediction
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 The Modern Stack is COMPLEX
- 3 Vulnerability Volume Increasing
- 4 Remember the Recall
- 5 What Matters for Scoring
- 6 Measuring Remediation Strategies
- 7 Coverage & Efficiency, Explained
- 8 Coverage / Efficiency Tradeoff
- 9 Current Attacker Velocity
- 10 Factoring in Velocity
- 11 The Case for Prediction
- 12 What Is Machine Learning?
- 13 Data Sources: CVE Enrichment Projects
- 14 Data Sources: Exploit Code & Observations
- 15 Type of Algorithms
- 16 Supervised Classification
- 17 Predictive - The Expectations
- 18 Coverage Efficiency Tradeoffs
- 19 Machine Learning Has Side Benefits
- 20 Lesson: Probability is our friend