YoVDO

How Hackers Evade Your AI-Enabled Endpoint Detection Tools

Offered By: YouTube

Tags

GrrCon Courses Artificial Intelligence Courses Cybersecurity Courses Virtualization Courses Malware Analysis Courses Vulnerability Assessment Courses Privileged Access Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how hackers bypass AI-powered endpoint detection tools in this GrrCON 2019 conference talk. Delve into the limitations of AI in cybersecurity, learn about malware disguise techniques, and understand the vulnerabilities exposed in AI-driven security systems. Examine the relationship between AI and threat actors, analyze endpoint detection tools, and discover the role of virtualization isolation in cybersecurity. Watch a live demonstration and gain insights into Privileged Access Management to enhance your organization's security posture against evolving hacking techniques.

Syllabus

Intro
AI is just hype
AI is not a silver bullet
Malware disguises itself
Vulnerability exposed
AI and threat actors
Endpoint detection tools
Virtualization isolation
Demo
Privileged Access Management


Related Courses

Introduction to Artificial Intelligence
Stanford University via Udacity
Probabilistic Graphical Models 1: Representation
Stanford University via Coursera
Artificial Intelligence for Robotics
Stanford University via Udacity
Computer Vision: The Fundamentals
University of California, Berkeley via Coursera
Learning from Data (Introductory Machine Learning course)
California Institute of Technology via Independent