![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course aims to teach learners how to use machine learning to detect complex threats. The course covers topics such as understanding complex threats, the stages of an APT (Advanced Persistent Threat), technical controls, challenges in mitigation, and the use of machine learning in security. The skills taught include utilizing the Elastic Stack architecture, algorithms, text mining, and building a pipeline for threat detection. The teaching method involves a presentation format with slides and other visual aids. This course is intended for security specialists, decision makers, entrepreneurs, developers, and anyone interested in information security and machine learning.
Syllabus
Intro
The problem
Agenda
Complex Threats
Stages of an APT
Technical controls
Challenges in mitigation
How long does it take to remediate
James Bond
Solutions
Definitions
What does Machine Learning do
Available Data
Sneak Peak
Elastic Stack
Architecture
Algorithms
Text Mining
Building the Pipeline
Haystack
Are we building another CMS
Statistics
Taught by
DefCamp