YoVDO

Hunting Stealth Adversaries with Graphs & AI

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Artificial Intelligence Courses Cybersecurity Courses Machine Learning Courses Graph Theory Courses Threat Detection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for detecting hidden cyber threats in a 48-minute conference talk from RSA Conference. Discover how combining graph theory with artificial intelligence can revolutionize the detection of stealthy adversaries amidst normal network activity. Learn from Jess Garcia, Founder of One eSecurity, as he demonstrates the application of machine learning to graph-modeled lateral movement telemetry. Gain practical insights into using CHRYSALIS, the ds4n6.io Data Science for DFIR framework, to uncover sophisticated cyber threats using real-world data examples. Enhance your cybersecurity skills and stay ahead of evolving threats by mastering these cutting-edge detection methodologies.

Syllabus

Hunting Stealth Adversaries with Graphs & AI


Taught by

RSA Conference

Related Courses

Aplicaciones de la teoría de grafos a la vida real
Miríadax
Aplicaciones de la Teoría de Grafos a la vida real
Universitat Politècnica de València via UPV [X]
Introduction to Computational Thinking and Data Science
Massachusetts Institute of Technology via edX
Genome Sequencing (Bioinformatics II)
University of California, San Diego via Coursera
Algorithmic Information Dynamics: From Networks to Cells
Santa Fe Institute via Complexity Explorer