Hunting Stealth Adversaries with Graphs & AI
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore advanced techniques for detecting hidden cyber threats in a 48-minute conference talk from RSA Conference. Discover how combining graph theory with artificial intelligence can revolutionize the detection of stealthy adversaries amidst normal network activity. Learn from Jess Garcia, Founder of One eSecurity, as he demonstrates the application of machine learning to graph-modeled lateral movement telemetry. Gain practical insights into using CHRYSALIS, the ds4n6.io Data Science for DFIR framework, to uncover sophisticated cyber threats using real-world data examples. Enhance your cybersecurity skills and stay ahead of evolving threats by mastering these cutting-edge detection methodologies.
Syllabus
Hunting Stealth Adversaries with Graphs & AI
Taught by
RSA Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network