How Hackers Evade Your AI-Enabled Endpoint Detection Tools
Offered By: YouTube
Course Description
Overview
Explore how hackers bypass AI-powered endpoint detection tools in this GrrCON 2019 conference talk. Delve into the limitations of AI in cybersecurity, learn about malware disguise techniques, and understand the vulnerabilities exposed in AI-driven security systems. Examine the relationship between AI and threat actors, analyze endpoint detection tools, and discover the role of virtualization isolation in cybersecurity. Watch a live demonstration and gain insights into Privileged Access Management to enhance your organization's security posture against evolving hacking techniques.
Syllabus
Intro
AI is just hype
AI is not a silver bullet
Malware disguises itself
Vulnerability exposed
AI and threat actors
Endpoint detection tools
Virtualization isolation
Demo
Privileged Access Management
Related Courses
Introduction to Artificial IntelligenceStanford University via Udacity Probabilistic Graphical Models 1: Representation
Stanford University via Coursera Artificial Intelligence for Robotics
Stanford University via Udacity Computer Vision: The Fundamentals
University of California, Berkeley via Coursera Learning from Data (Introductory Machine Learning course)
California Institute of Technology via Independent