YoVDO

Exploring Anomalies in Authentication Logs with Autoencoders

Offered By: Databricks via YouTube

Tags

Autoencoders Courses Cybersecurity Courses Machine Learning Courses Unsupervised Learning Courses Anomaly Detection Courses Data Transformation Courses Log Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover how to leverage unsupervised techniques, specifically autoencoders, to detect cybersecurity events in authentication logs in this 33-minute conference talk. Learn about the limitations of traditional rule-based models and explore a more advanced approach that transforms and simplifies complex log data. Gain insights into feeding processed data into an autoencoder and evaluating the output for anomaly detection. Presented by Hayden Beadles, Sr. Security Machine Learning Engineer, and Jericho Cain, Sr Staff Security Data Scientist from Adobe, this talk offers valuable knowledge for enhancing cybersecurity practices using machine learning techniques.

Syllabus

Exploring Anomalies in Authentication Logs with Autoencoders


Taught by

Databricks

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network