How Hackers Evade Your AI-Enabled Endpoint Detection Tools
Offered By: YouTube
Course Description
Overview
Explore how hackers bypass AI-powered endpoint detection tools in this GrrCON 2019 conference talk. Delve into the limitations of AI in cybersecurity, learn about malware disguise techniques, and understand the vulnerabilities exposed in AI-driven security systems. Examine the relationship between AI and threat actors, analyze endpoint detection tools, and discover the role of virtualization isolation in cybersecurity. Watch a live demonstration and gain insights into Privileged Access Management to enhance your organization's security posture against evolving hacking techniques.
Syllabus
Intro
AI is just hype
AI is not a silver bullet
Malware disguises itself
Vulnerability exposed
AI and threat actors
Endpoint detection tools
Virtualization isolation
Demo
Privileged Access Management
Related Courses
Advanced Operating SystemsGeorgia Institute of Technology via Udacity Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure
University of Illinois at Urbana-Champaign via Coursera GT - Refresher - Advanced OS
Georgia Institute of Technology via Udacity Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX Microsoft Windows Server 2012 Fundamentals: Hyper-V
Microsoft via edX