YoVDO

Security and Information Assurance with Deep Learning

Offered By: Jeff Heaton via YouTube

Tags

Deep Learning Courses Overfitting Courses Intrusion Detection Systems Courses Malware Classification Courses

Course Description

Overview

Explore an introduction to security in deep learning, focusing on intrusion detection systems (IDS) and common machine learning pitfalls. Delve into the complexities of security data, the FASTT system, and issues of target leakage. Examine real-world examples like the "dog or muffin" problem, stop sign recognition, and wolf vs. husky classification to understand the challenges in training data and the importance of distinguishing correlation from causation. Learn about the KDD-99 dataset and malware classification as a complex security application. Discover techniques to prevent overfitting and gain insights into hardware considerations for deep learning in security contexts.

Syllabus

Intro
Intrusion Detection Systems (IDS)
Security Data are Complex
The FASTT System
More Target Leakage
Dog or Muffin?
Stop Sign?
Wolf or Husky? - Training Data
Correlation vs Causation
This Might Be Believable
KDD-99 Dataset
Malware Classification: A Relatively Complex Security Application
Malware File Format
Winning Entry
Technique Overview ("NO to overfitting!")
Hardware Used


Taught by

Jeff Heaton

Related Courses

Systems and Application Security
(ISC)² via Coursera
Fundamentals of Computer Network Security
University of Colorado System via Coursera
Basic Network and Database Security
IBM via edX
Information Security Operations Center ISOC for Non-Techies
Udemy
Cybersecurity of Networks from Scratch to Advanced
Udemy