Scientific Computing for Information Security - Forging the Missing Link
Offered By: YouTube
Course Description
Overview
Explore scientific computing's role in information security through this 41-minute conference talk from Derbycon 2019. Discover how robotic process automation, data analytics, and tools like Jupiter Notebook can revolutionize security practices. Learn from real-world examples, including IP mapping and vulnerability count analysis. Gain insights into overcoming challenges, collaborating with business partners, and leveraging data science libraries to enhance security effectiveness. Includes practical demonstrations on importing Excel data and working with DataFrames.
Syllabus
Intro
Thank yous
How can we evolve
We are going to fail
Robotic process automation
We need to be effective
Data and analytics
Data gravity
Learning from others
Jupiter Notebook
Data scientist libraries
Basket
Dependencies
Security Risk Advisors
Examples
IP Map
Publish Metrics
Why do our vulnerability counts always increase
Challenges to solve
Money to be made
Work with the business partner
Demos
Importing Excel
DataFrame
Questions
Related Courses
Understanding China, 1700-2000: A Data Analytic Approach, Part 1The Hong Kong University of Science and Technology via Coursera The Analytics Edge
Massachusetts Institute of Technology via edX 大数据与信息传播 Big Data and Information Dissemination
Fudan University via Coursera The Future of Fashion
Marist College via Independent The Mobile Consumer
Marist College via Independent