Preparing and exploring security data for machine learning.

What is this video course about, and why is it important? Today, arguably the most important field in the IT industry is security. With more and more commerce and business being conducted online every day, keeping data safe and detecting and repelling attacks is paramount to every organization. One...

Full description

Saved in:
Bibliographic Details
Format: Electronic Video
Language:English
Published: [Place of publication not identified] : O'Reilly Media, Inc., [2018]
Edition:[First edition].
Subjects:
Online Access:CONNECT

MARC

LEADER 00000ngm a22000007i 4500
001 in00006223574
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 221018s2018 xx 114 o vleng d
005 20221027142756.9
035 |a 1WRLDSHRon1348103856 
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA 
020 |a 9781492032335  |q (electronic video) 
020 |a 1492032336  |q (electronic video) 
035 |a (OCoLC)1348103856 
037 |a 9781492032335  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23/eng/20221018 
049 |a TXMM 
245 0 0 |a Preparing and exploring security data for machine learning. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b O'Reilly Media, Inc.,  |c [2018] 
300 |a 1 online resource (1 video file (1 hr., 54 min.)) :  |b sound, color. 
306 |a 015400 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a video  |b v  |2 rdamedia 
337 |a computer  |b c  |2 rdamedia 
338 |a other  |b vz  |2 rdacarrier 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Charles Givre, presenter. 
520 |a What is this video course about, and why is it important? Today, arguably the most important field in the IT industry is security. With more and more commerce and business being conducted online every day, keeping data safe and detecting and repelling attacks is paramount to every organization. One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. Indeed, machine learning is being used to defend systems and networks across an increasing range of industries and enterprises, so it's no mystery that there's also an increasing demand for skilled and qualified security specialists who can apply data science techniques to the task of data security. If you're a security engineer, network analyst, or anyone else charged with protecting your organization's valuable IT system and data, this video will show you how to quickly and efficiently ingest a variety of data types typically used in security settings and prepare them for analysis in the Python data science ecosystem. Your host, cyber security specialist and data scientist Charles Givre, teaches the concepts behind vectorized computing as it applies specifically to security. Gathering and preparing data is one of the biggest challenges facing anyone who is seeking to do advanced analysis and machine learning. This video will help you learn how to use the Pandas ecosystem to quickly and effectively gather, prepare, and explore security data for advanced analysis and machine learning. This video is one in a set of three, intended for security professionals who want to learn how to use and apply data science to their toughest security problems. It focuses on the tools and techniques that are directly applicable to the industry, and uses security problems and datasets to walk you through the entire data science process from end-to-end. What you'll learn--and how you can apply it How to use Pandas for security data preparation How to ingest, manipulate, and summarize multidimensional data How to quickly extract, transform, and load (ETL) security data from a variety of sources into the Pandas ecosystem, extract features, and prepare the data for machine learning This video course is for you because... You're a security professional with some scripting skills and you want to apply data science techniques to your work to analyze data more efficiently You're a network analyst with some scripting skills and you want to use machine learning techniques to better secure your network Prerequisites: You should have beginner- to intermediate-level experience with the Python programming language You should be familiar with security and networking concepts You should be generally familiar with basic statistical concepts Materials or downloads needed in advance: You're encouraged to use the Griffon Virtual Machine for Data Science, which is available at https://github.com/gtkcyber/griffon-vm. (Griffon is a virtual machine with all data sources and all tools preconfigured) You should have access to a computer with at least 8 GB RAM and 20 to 30 GB of available hard drive space. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed October 18, 2022). 
590 0 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Machine learning. 
650 0 |a Computer security. 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
700 1 |a Givre, Charles,  |e presenter. 
710 2 |a O'Reilly (Firm),  |e publisher. 
730 0 |a WORLDSHARE SUB RECORDS 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781492032335/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi 
999 f f |s b86e9c0d-c262-4e20-bae3-09c76d0b2779  |i b866bee9-0b32-4e2f-98c1-0be7902d3e9a  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e TK5105.59   |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781492032335/?ar  |z CONNECT