YoVDO

How Hackers Evade Your AI-Enabled Endpoint Detection Tools

Offered By: YouTube

Tags

GrrCon Courses Artificial Intelligence Courses Cybersecurity Courses Virtualization Courses Malware Analysis Courses Vulnerability Assessment Courses Privileged Access Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how hackers bypass AI-powered endpoint detection tools in this GrrCON 2019 conference talk. Delve into the limitations of AI in cybersecurity, learn about malware disguise techniques, and understand the vulnerabilities exposed in AI-driven security systems. Examine the relationship between AI and threat actors, analyze endpoint detection tools, and discover the role of virtualization isolation in cybersecurity. Watch a live demonstration and gain insights into Privileged Access Management to enhance your organization's security posture against evolving hacking techniques.

Syllabus

Intro
AI is just hype
AI is not a silver bullet
Malware disguises itself
Vulnerability exposed
AI and threat actors
Endpoint detection tools
Virtualization isolation
Demo
Privileged Access Management


Related Courses

5G Network Fundamentals
Institut Mines-Télécom via Coursera
Introduction to Azure Virtual Desktop
A Cloud Guru
Introduction to Azure VMware Cloud Solution
A Cloud Guru
Introduction to Linux Virtualization from the Command Line
A Cloud Guru
KVM Virtualization on Linux
A Cloud Guru