The age of intelligent machines is here! We are now seeing Machine Learning disrupting every technological field including computer security. As more and more security products use Machine Learning, it is important as Pentesters and Security Researchers to understand how to make and break this technology!
Course Curriculum
Introduction | |||
Course Introduction | 00:00:00 | ||
Lab Setup and Installation | 00:00:00 | ||
Pandas | |||
Module 1: Pandas Part 1 | 00:00:00 | ||
Module 1: Pandas Part 2 | 00:00:00 | ||
Module 1: Pandas Part 3 | 00:00:00 | ||
Module 1: Pandas Part 4 | 00:00:00 | ||
Module 2: K Nearest Neighbors (KNN) | |||
Module 2: K Nearest Neighbors (KNN) Part 1 | 00:00:00 | ||
Module 2: K Nearest Neighbors (KNN) Part 2 | 00:00:00 | ||
Module 2: K Nearest Neighbors (KNN) Part 3 | 00:00:00 | ||
Module 2: K Nearest Neighbors (KNN) Part 4 | 00:00:00 | ||
Module 3: Model Evaluation and Linear Regression | |||
Module 3: Model Evaluation and Linear Regression Part 1 | 00:00:00 | ||
Module 3: Model Evaluation and Linear Regression Part 2 | 00:00:00 | ||
Module 3: Model Evaluation and Linear Regression Part 3 | 00:00:00 | ||
Module 3: Model Evaluation and Linear Regression Part 4 | 00:00:00 | ||
Module 4: Logistic Regression | |||
Module 4: Logistic Regression Part 1 | 00:00:00 | ||
Module 4: Logistic Regression Part 2 | 00:00:00 | ||
Module 4: Logistic Regression Part 3 | 00:00:00 | ||
Module 4: Logistic Regression Part 4 | 00:00:00 | ||
Module 5: Natural Language Processing | |||
Module 5: Natural Language Processing Part 1 | 00:00:00 | ||
Module 5: Natural Language Processing Part 2 | 00:00:00 | ||
Module 5: Natural Language Processing Part 3 | 00:00:00 | ||
Module 5: Natural Language Processing Part 4 | 00:00:00 | ||
Module 6: Naive Bayes Classification | |||
Module 6: Naive Bayes Classification Part 1 | 00:00:00 | ||
Module 6: Naive Bayes Classification Part 2 | 00:00:00 | ||
Module 6: Naive Bayes Classification Part 3 | 00:00:00 | ||
Module 6: Naive Bayes Classification Part 4 | 00:00:00 | ||
Module 7: Advanced Scikit Learn | |||
Module 7: Advanced Scikit Learn Part 1 | 00:00:00 | ||
Module 7: Advanced Scikit Learn Part 2 | 00:00:00 | ||
Module 8: Decision Trees | |||
Module 8: Decision Trees Part 1 | 00:00:00 | ||
Module 8: Decision Trees Part 2 | 00:00:00 | ||
Module 8: Decision Trees Part 3 | 00:00:00 | ||
Module 9: Ensembling Techniques | |||
Module 9: Ensembling Techniques Part 1 | 00:00:00 | ||
Module 9: Ensembling Techniques Part 2 | 00:00:00 | ||
Module 9: Ensembling Techniques Part 3 | 00:00:00 | ||
Module 9: Ensembling Techniques Part 4 | 00:00:00 | ||
Module 10: Dimension Reduction | |||
Module 10: Dimension Reduction Part 1 | 00:00:00 | ||
Module 10: Dimension Reduction Part 2 | 00:00:00 | ||
Module 10: Dimension Reduction Part 3 | 00:00:00 | ||
Module 10: Dimension Reduction Part 3 | 00:00:00 | ||
Module 11: Clustering | |||
Module 11: Clustering Part 1 | 00:00:00 | ||
Module 11: Clustering Part 2 | 00:00:00 | ||
Module 11: Clustering Part 3 | 00:00:00 | ||
Module 12: Stochastic Gradient Descent | |||
Module 12: Stochastic Gradient Descent Part 1 | 00:00:00 | ||
Module 12: Stochastic Gradient Descent Part 2 | 00:00:00 | ||
Module 12: Stochastic Gradient Descent Part 3 | 00:00:00 | ||
Module 13: Neural Networks - Deep Learning | |||
Module 13: Neural Networks – Deep Learning Part 1 | 00:00:00 | ||
Module 13: Neural Networks – Deep Learning Part 2 | 00:00:00 | ||
Module 13: Neural Networks – Deep Learning Part 3 | 00:00:00 | ||
Module 14: Recommendations Engine | |||
Module 14: Recommendations Engine Part 1 | 00:00:00 | ||
Module 14: Recommendations Engine Part 2 | 00:00:00 | ||
Case Study: Detecting Malicious URLs | 00:00:00 | ||
Code and Sample Data | 00:00:00 |
3 STUDENTS ENROLLED