AI and Cybersecurity - The Twain Shall Meet
Offered By: CAE in Cybersecurity Community via YouTube
Course Description
Overview
Syllabus
Intro
UMBO Advanced Persistent Threats AR - Long & Multi-step Process - Different vulnerabilities exploited - APT37 (REAPER)
UMBO AI for Cybersecurity: TLDR Version . Most IDS systems are point-based & driven by known signatures . Our system maps multiple traditional and novel sensors to a common ontology
Detecting Intrusions using Policies, Context, and Reasoning 1. Detect potential new vulnerabilities from (Dark) Web descriptions, blogs, tweets, and discussions, extract information and map to
UMBO What does that mean? Deductive Reasoning Can you represent "rules" in an Analyst's brain, and reason over them with facts ? - Background knowledge/Intelligence - New Vulnerabilities have been discovered in a software. Household machines with DHCP addresses
Why can't we use an NLP toolkit out of the box
Tracking vulnerability inheritance during development Software supply chain attacks!
Multi-lingual Threat Intelligence
Taught by
CAE in Cybersecurity Community
Related Courses
Introduction to Artificial IntelligenceStanford University via Udacity Probabilistic Graphical Models 1: Representation
Stanford University via Coursera Artificial Intelligence for Robotics
Stanford University via Udacity Computer Vision: The Fundamentals
University of California, Berkeley via Coursera Learning from Data (Introductory Machine Learning course)
California Institute of Technology via Independent