Exploring Anomalies in Authentication Logs with Autoencoders
Offered By: Databricks via YouTube
Course Description
Overview
Discover how to leverage unsupervised techniques, specifically autoencoders, to detect cybersecurity events in authentication logs in this 33-minute conference talk. Learn about the limitations of traditional rule-based models and explore a more advanced approach that transforms and simplifies complex log data. Gain insights into feeding processed data into an autoencoder and evaluating the output for anomaly detection. Presented by Hayden Beadles, Sr. Security Machine Learning Engineer, and Jericho Cain, Sr Staff Security Data Scientist from Adobe, this talk offers valuable knowledge for enhancing cybersecurity practices using machine learning techniques.
Syllabus
Exploring Anomalies in Authentication Logs with Autoencoders
Taught by
Databricks
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network