Hands-On Machine Learning For Cybersecurity
(ML-CYBERSEC.AJ1) / ISBN : 978-1-64459-511-4
About This Course
Explore the fundamentals of machine learning and understand its application in the cybersecurity landscape and learn how to prepare and optimize data for machine learning, extracting valuable features for effective threat detection. Whether you're a cybersecurity professional, IT enthusiast, or someone looking to enter the field, Hands-On Machine Learning For Cybersecurity course is your gateway to mastering machine learning for cybersecurity.
Skills You’ll Get
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
12+ Interactive Lessons | 19+ Exercises | 82+ Quizzes | 56+ Flashcards | 56+ Glossary of terms
Gamified TestPrep
Hands-On Labs
19+ LiveLab | 18+ Video tutorials | 41+ Minutes
Preface
- Who this course is for
- What this course covers
- To get the most out of this course
Basics of Machine Learning in Cybersecurity
- What is machine learning?
- Summary
Time Series Analysis and Ensemble Modeling
- What is a time series?
- Classes of time series models
- Time series decomposition
- Use cases for time series
- Time series analysis in cybersecurity
- Time series trends and seasonal spikes
- Predicting DDoS attacks
- Ensemble learning methods
- Voting ensemble method to detect cyber attacks
- Summary
Segregating Legitimate and Lousy URLs
- Introduction to the types of abnormalities in URLs
- Using heuristics to detect malicious pages
- Using machine learning to detect malicious URLs
- Logistic regression to detect malicious URLs
- SVM to detect malicious URLs
- Multiclass classification for URL classification
- Summary
Knocking Down CAPTCHAs
- Characteristics of CAPTCHA
- Using artificial intelligence to crack CAPTCHA
- Summary
Using Data Science to Catch Email Fraud and Spam
- Email spoofing
- Spam detection
- Summary
Efficient Network Anomaly Detection Using k-means
- Stages of a network attack
- Dealing with lateral movement in networks
- Using Windows event logs to detect network anomalies
- Ingesting active directory data
- Data parsing
- Modeling
- Detecting anomalies in a network with k-means
- Summary
Decision Tree and Context-Based Malicious Event Detection
- Adware
- Bots
- Bugs
- Ransomware
- Rootkit
- Spyware
- Trojan horses
- Viruses
- Worms
- Malicious data injection within databases
- Malicious injections in wireless sensors
- Use case
- Revisiting malicious URL detection with decision trees
- Summary
Catching Impersonators and Hackers Red Handed
- Understanding impersonation
- Different types of impersonation fraud
- Levenshtein distance
- Summary
Changing the Game with TensorFlow
- Introduction to TensorFlow
- Installation of TensorFlow
- TensorFlow for Windows users
- Hello world in TensorFlow
- Importing the MNIST dataset
- Computation graphs
- Tensor processing unit
- Using TensorFlow for intrusion detection
- Summary
Financial Fraud and How Deep Learning Can Mitigate It
- Machine learning to detect financial fraud
- Logistic regression classifier – under-sampled data
- Deep learning time
- Summary
Case Studies
- Introduction to our password dataset
- Summary
Time Series Analysis and Ensemble Modeling
- Creating a Time Series Model to Predict DDoS Attacks
- Detecting Cyber Attacks Using the Voting Ensemble Method
Segregating Legitimate and Lousy URLs
- Using Heuristics to Detect Malicious Pages
- Comparing Different ML Models to Detect Malicious URLs
- Using a Multiclass Classifier to Detect Malicious URLs
Using Data Science to Catch Email Fraud and Spam
- Using Logistic Regression to Detect Spam SMS
- Creating a Naive Bayes Spam Classifier
Efficient Network Anomaly Detection Using k-means
- Using k-Means to Detect Anomalies in a Network
Decision Tree and Context-Based Malicious Event Detection
- Using Decision Trees and Random Forests for Classifying Malicious Data
- Detecting Rootkits
- Exploiting a Website Using SQL Injection
- Detecting Anomaly Using Isolation Forest
- Detecting Malicious URL With Decision Trees
Catching Impersonators and Hackers Red Handed
- Using Authorship Attribution for Detecting Real Tweets
Financial Fraud and How Deep Learning Can Mitigate It
- Detecting Credit Card Fraud
- Building a Logistic Regression Classifier for Under-Sampled Data
- Building a Logistic Regression Classifier for Skewed Data
- Building a Deep Learning Classifier for Under-Sampled Data
Case Studies
- Creating a Password Tester