YoVDO

Security and Information Assurance with Deep Learning

Offered By: Jeff Heaton via YouTube

Tags

Deep Learning Courses Overfitting Courses Intrusion Detection Systems Courses Malware Classification Courses

Course Description

Overview

Explore an introduction to security in deep learning, focusing on intrusion detection systems (IDS) and common machine learning pitfalls. Delve into the complexities of security data, the FASTT system, and issues of target leakage. Examine real-world examples like the "dog or muffin" problem, stop sign recognition, and wolf vs. husky classification to understand the challenges in training data and the importance of distinguishing correlation from causation. Learn about the KDD-99 dataset and malware classification as a complex security application. Discover techniques to prevent overfitting and gain insights into hardware considerations for deep learning in security contexts.

Syllabus

Intro
Intrusion Detection Systems (IDS)
Security Data are Complex
The FASTT System
More Target Leakage
Dog or Muffin?
Stop Sign?
Wolf or Husky? - Training Data
Correlation vs Causation
This Might Be Believable
KDD-99 Dataset
Malware Classification: A Relatively Complex Security Application
Malware File Format
Winning Entry
Technique Overview ("NO to overfitting!")
Hardware Used


Taught by

Jeff Heaton

Related Courses

Practical Machine Learning
Johns Hopkins University via Coursera
Practical Deep Learning For Coders
fast.ai via Independent
機器學習基石下 (Machine Learning Foundations)---Algorithmic Foundations
National Taiwan University via Coursera
Data Analytics Foundations for Accountancy II
University of Illinois at Urbana-Champaign via Coursera
Entraînez un modèle prédictif linéaire
CentraleSupélec via OpenClassrooms