YoVDO

How Hackers Evade Your AI-Enabled Endpoint Detection Tools

Offered By: YouTube

Tags

GrrCon Courses Artificial Intelligence Courses Cybersecurity Courses Virtualization Courses Malware Analysis Courses Vulnerability Assessment Courses Privileged Access Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how hackers bypass AI-powered endpoint detection tools in this GrrCON 2019 conference talk. Delve into the limitations of AI in cybersecurity, learn about malware disguise techniques, and understand the vulnerabilities exposed in AI-driven security systems. Examine the relationship between AI and threat actors, analyze endpoint detection tools, and discover the role of virtualization isolation in cybersecurity. Watch a live demonstration and gain insights into Privileged Access Management to enhance your organization's security posture against evolving hacking techniques.

Syllabus

Intro
AI is just hype
AI is not a silver bullet
Malware disguises itself
Vulnerability exposed
AI and threat actors
Endpoint detection tools
Virtualization isolation
Demo
Privileged Access Management


Related Courses

Advanced Operating Systems
Georgia Institute of Technology via Udacity
Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure
University of Illinois at Urbana-Champaign via Coursera
GT - Refresher - Advanced OS
Georgia Institute of Technology via Udacity
Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
Microsoft Windows Server 2012 Fundamentals: Hyper-V
Microsoft via edX