YoVDO

Graph-Charged Cybersecurity Intelligence

Offered By: Oracle via YouTube

Tags

Oracle CloudWorld Courses Machine Learning Courses Anomaly Detection Courses Cloud Security Courses Threat Detection Courses

Course Description

Overview

Explore graph-powered cybersecurity intelligence in this 23-minute conference talk from CloudWorld 2022. Dive into Oracle's threat detection pipeline, designed to build a real-time, smarter, and deeper cybersecurity intelligence system with interpretable results. Learn about the battle between cloud security providers and sophisticated malicious attackers, and discover how graph technology is revolutionizing threat detection. Gain insights into anomaly sessions, log data processing, and the use of graph search and virtual nodes. Understand the challenges of trusting machine learning models and the importance of interactive interpretation capabilities for threat investigators. Discover how Oracle's approach enables visual and interactive explanations from machine learning models, empowering security professionals to determine appropriate actions in response to evolving threats.

Syllabus

Introduction
Overview
Context
Goals
Pipeline
Anomaly sessions
Logs
Data
Decrease Data
Results
Precision
Graphs
Graph Search
Virtual Nodes
What do we get
What to do
Trust the model
Graph Neural Network Explainer
Graph Neural Network Investigation
Challenges
Contact us


Taught by

Oracle

Tags

Related Courses

Windows Server 2016 Security Features
Microsoft via edX
Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Microsoft Professional Capstone : Cybersecurity
Microsoft via edX
Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn