PowerShell Classification - Life, Learning, and Self-Discovery
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the world of PowerShell classification and its implications for cybersecurity in this BSidesLV conference talk. Delve into the importance of PowerShell, its flexibility, and its role in exploit frameworks. Learn about querying and analyzing PowerShell logs, evasion tactics, and the application of machine learning techniques for detection. Discover insights on high-level features, cosine similarity, and algorithm evaluation. Gain valuable lessons on overcoming challenges such as overfitting, data normalization, and performance measurement. Understand the significance of real-time pipelines and data merging in enhancing detection efficacy. Engage with a comprehensive overview of PowerShell classification that bridges technical knowledge with personal growth and self-discovery.
Syllabus
Introduction
Who am I
Audience
Agenda
What is PowerShell
Why is PowerShell important
Exploit frameworks
PowerShell is extremely flexible
PowerShell is important to miner
Querying PowerShell logs
PowerShell logs
References
Analyzing PowerShell Data
Evasion Tactics
Special Characters
Cosine Similarity
HighLevel Features
Machine Learning
Documentation
Raw Events
Transformation
Sample Event
Algorithm Evaluation
Results
Accuracy
Precision
Random Force
Lessons Learned
Overfitting
Normalized Data
Get More Data
Measure Your Performance
Code Names Stick Around
Detection Efficacy
RealTime Pipeline
Merging work
Data set
Questions
Taught by
BSidesLV
Related Courses
Deploying Applications with HerokuUdacity User Research and Design
University of Minnesota via Coursera Planning a Security Incident Response
Microsoft via edX Kubernetes Hands-On - Deploy Microservices to the AWS Cloud
Udemy Contact Center AI: Building a Dynamic Virtual Agent
Pluralsight