4.5 out of 5
4.5
8 reviews on Udemy

The Complete Artificial Intelligence for Cyber Security 2021

Combine the power of Data Science, Machine Learning and Deep Learning to create powerful AI for Real-World applications
Instructor:
Hoang Quy La
143 students enrolled
English [Auto]
Isolation Forest
Markov Chains
Statsmodels
NLP (Natural Language Processing)
Linear Regression
Logistic Regression
Naïve Bayes
ANN (Artificial Intelligence)
Random Forest
K-means
HMM
Eigenfaces and Eigenvalues
SVM (Support Vector Machine)
XGBOOST
Pandas
Numpy
matplotlib
IF-IDF
Tensorflow
Scikit-Learn
Cyber security
Google Colab
Data Pre-processing.
Analysing Data.
Data standardization.
Splitting Data into Training Set and Test Set.
One-hot Encoding.
Understanding Machine Learning Algorithm.
Training Neural Network.
Model building.
Analysing Results.
Model compilation.
A Comparison Of Categorical And Binary Problem.
Make a Prediction.
Testing Accuracy.
Confusion Matrix.
Keras.

*** AS SEEN ON KICKSTARTER ***

Learn key AI concepts and intuition training to get you quickly up to speed with all things AI. Covering:

  • How to start building AI with no previous coding experience using Python.

  • How to solve AI problems in cyber security field.

Here is what you will get with this course:

1. Complete beginner to expert AI skills – Learn to code self-improving AI for a range of purposes. In fact, I will code together with you. Every tutorial starts with a blank page and we write up the code from scratch. This way you can follow along and understand exactly how the code comes together and what each line means.

2. Coding step– Plus, you’ll get a template which shows all the steps and all detailed explanations on each step.

3. Intuition Tutorials – Where most courses simply bombard you with dense theory and set you on your way, you will develop a deep understanding for not only what you’re doing, but why you’re doing it. That’s why I don’t throw complex theories at you, but focus on building up your intuition in coding AI making for infinitely better results down the line.

4. Real-world solutions – You’ll achieve your goal in not only 1 project but in more than 10. Each module is comprised of varying structures and difficulties, meaning you’ll be skilled enough to build AI adaptable to any projects in real life, rather than just passing a glorified memory “test and forget” like most other courses. Practice truly does make perfect.

5. In-course support – I fully committed to making this the most accessible and results-driven AI course on the planet. This requires me to be there when you need my help. That’s why I will support you in your journey, meaning you’ll get a response from me within 72 hours maximum.

Introduction

1
Course structure
2
How To Make The Most Out Of This Course
3
Who is this course for????
4
How does the course work?
5
Important note about tools in this course
6
Type of Machine learning
7
AI in the context of cybersecurity

Basic machine learning for cyber security

1
Introduction
2
Train test splitting the data Introduction
3
Train test splitting the data Implemetation
4
Standardizing your data
5
Summarizing large data using principal component analysis
6
Generating text using Markov chains
7
Performing clustering using scikit-learn
8
Training an XGBoost classifier
9
Analyzing time series using statsmodels
10
Analyzing time series using statsmodels Explanation
11
Anomaly detection with Isolation Forest introduction
12
Anomaly detection with Isolation Forest Implementation
13
Anomaly detection with Isolation Forest Explanation
14
Natural language processing using a hashing vectorizer and tf-idf Introduction
15
Natural language processing using a hashing vectorizer and tf-idf Implementation
16
Hyperparameter tuning with scikit-optimize Implementation Part 1
17
Hyperparameter tuning with scikit-optimize Implementation Part 2

Detecting Email Cybersecurity Threats with AI

1
Introduction
2
Introduction to detect spam with Perceptrons
3
Introduction to Perceptrons
4
Introduction to spam filters
5
Spam filter in action
6
Detecting spam with linear classifiers
7
How the Perceptron learns
8
A simple Perceptron-based spam filter
9
Pros and cons of Perceptrons
10
Introduction to Spam detection with SVMs
11
SVM spam filter example
12
Introduction to Phishing detection with logistic regression and decision trees
13
Linear regression for spam detection
14
introduction to Logistic regression
15
Logistic Regression Implementation
16
Introduction to making decisions with trees
17
Phishing detection with decision trees
18
Spam detection with Naive Bayes
19
NLP with Naive Bayes Implementation
20
Summary of the project

Malware Threat Detection

1
Introduction to Malware detection
2
Malware goes by many names
3
Malware analysis tools of the trade
4
Static malware analysis
5
Dynamic malware analysis
6
Hacking the PE file format
7
Introduction of Decision tree malware detectors
8
Malware detection with decision trees
9
Random Forest Malware classifier
10
Clustering malware with K-Means
11
K-Means steps and its advantages and disadvantages
12
Detecting metamorphic malware with HMMs Introductions
13
Polymorphic malware detection strategies
14
HMM Implementation
15
Summary of the section

Advanced malware threat detection

1
Introduction
2
Detecting obfuscated JavaScript Implementation
3
Detecting obfuscated JavaScript Explaination
4
Tracking malware drift Implementation
5
Tracking malware drift Explaination

Network Anomaly Detection with AI

1
Introduction to the project
2
Turning service logs into datasets
3
Introduction to classification of network attacks
4
Detecting botnet topology
5
Introduction to different ML algorithms for botnet detection
6
Introduction to Gaussian anomaly detection
7
Gaussian anomaly detection Implementation Part 1
8
Gaussian anomaly detection Implementation Part 2
9
Summary of the project

Securing Users Authentication

1
Introduction to Authentication abuse prevention
2
Fake login management- reactive versus predictive
3
Account reputation scoring
4
User authentication with keystroke recognition Introduction
5
User authentication with keystroke recognition Implementation
6
Biometric authentication with facial recognition Introduction
7
Dimensionality reduction with principal component analysis (PCA) Introduction
8
Eigenfaces Implementation
9
Summary of the section

Automatic intrusion detection

1
Introduction
2
Detecting DDos Attack
3
Credit Card fraud detection Introduction
4
Credit Card fraud detection Implementation
5
Counterfeit bank note detection Implementation
6
Ad blocking using machine learning Implementation
7
Wireless indoor localization Implementation
8
IoT device type identification using machine learning
9
Deepfake recognition

Securing and Attacking Data with Machine Learning

You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.5
4.5 out of 5
8 Ratings

Detailed Rating

Stars 5
5
Stars 4
2
Stars 3
1
Stars 2
0
Stars 1
0
30-Day Money-Back Guarantee

Includes

15 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion
The Complete Artificial Intelligence for Cyber Security 2021
Price:
$218.98 $169

Community

For Professionals

For Businesses

We support Sales, Marketing, Account Management and CX professionals. Learn new skills. Share your expertise. Connect with experts. Get inspired.

Community

Partnership Opportunities

Layer 1
samcx.com
Logo
Register New Account
Compare items
  • Total (0)
Compare
0