Overview
This course focuses on utilizing graph-powered cybersecurity intelligence to combat evolving threats in the cloud environment. The learning outcomes include understanding the Oracle threat detection pipeline, building a real-time cybersecurity intelligence system, and interpreting machine learning model explanations interactively. The course covers topics such as anomaly detection, graph search, virtual nodes, and utilizing Graph Neural Networks for investigation. The teaching method involves a presentation by Eric Wilders discussing the concepts. The course is intended for cybersecurity professionals, threat investigators, and individuals interested in cloud security and graph-powered intelligence.
Syllabus
Introduction
Overview
Context
Goals
Pipeline
Anomaly sessions
Logs
Data
Decrease Data
Results
Precision
Graphs
Graph Search
Virtual Nodes
What do we get
What to do
Trust the model
Graph Neural Network Explainer
Graph Neural Network Investigation
Challenges
Contact us
Taught by
Oracle