How Hackers Evade Your AI-Enabled Endpoint Detection Tools
Offered By: YouTube
Course Description
Overview
Explore how hackers bypass AI-powered endpoint detection tools in this GrrCON 2019 conference talk. Delve into the limitations of AI in cybersecurity, learn about malware disguise techniques, and understand the vulnerabilities exposed in AI-driven security systems. Examine the relationship between AI and threat actors, analyze endpoint detection tools, and discover the role of virtualization isolation in cybersecurity. Watch a live demonstration and gain insights into Privileged Access Management to enhance your organization's security posture against evolving hacking techniques.
Syllabus
Intro
AI is just hype
AI is not a silver bullet
Malware disguises itself
Vulnerability exposed
AI and threat actors
Endpoint detection tools
Virtualization isolation
Demo
Privileged Access Management
Related Courses
Windows Server 2016: Securing Identities and InformationMicrosoft via edX Implementing Microsoft Azure Privileged Identity Management
Pluralsight Microsoft 365 Security Administration (MS-500) Cert Prep: 1 Implement and Manage Identity and Access
LinkedIn Learning Securing Windows Server 2016: Managing Privileged Identities
LinkedIn Learning Securing Windows Server 2016
Udemy