Scientific Computing for Information Security - Forging the Missing Link
Offered By: YouTube
Course Description
Overview
Explore scientific computing's role in information security through this 41-minute conference talk from Derbycon 2019. Discover how robotic process automation, data analytics, and tools like Jupiter Notebook can revolutionize security practices. Learn from real-world examples, including IP mapping and vulnerability count analysis. Gain insights into overcoming challenges, collaborating with business partners, and leveraging data science libraries to enhance security effectiveness. Includes practical demonstrations on importing Excel data and working with DataFrames.
Syllabus
Intro
Thank yous
How can we evolve
We are going to fail
Robotic process automation
We need to be effective
Data and analytics
Data gravity
Learning from others
Jupiter Notebook
Data scientist libraries
Basket
Dependencies
Security Risk Advisors
Examples
IP Map
Publish Metrics
Why do our vulnerability counts always increase
Challenges to solve
Money to be made
Work with the business partner
Demos
Importing Excel
DataFrame
Questions
Related Courses
Powershell and Windows Throw the Best Shell PartiesYouTube Rawr - Rapid Assessment of Web Resources
YouTube Metasploit Town Hall - Redubbed
YouTube Hunting Webshells - Tracking TwoFace
YouTube Incident Response on macOS - Thomas Reed
YouTube