Videos

Published on February 22nd, 2019 📆 | 3052 Views ⚑

0

Machine Learning for Malware Detection – 1 – Introduction


Powered by iSpeech



Python for Pentesters course: http://bit.ly/2I0sRkm
Python Basics course: http://bit.ly/37cmhlx

Join me and other cyber-geeks on discord: http://bit.ly/2KH6aST
Join my SQUAD (for discounts'n'stuff): http://bit.ly/2xhSvM2

Hire me as a penetration tester: https://dgtsec.com/penetration-testing-services/
101 Pentesting Training: https://dgtsec.com/cybersec-pentesting-training/
101 Cybersecurity Consulting: https://dgtsec.com/cybersec-pentesting-training/

Connect with me:

Linkedin: https://www.linkedin.com/in/cristivlad/
Twitter: https://twitter.com/CristiVlad25
Facebook page: https://www.facebook.com/CristiVladZ/
Facebook group: https://www.facebook.com/groups/cybersecpros/
Hackthebox: https://www.hackthebox.eu/profile/27034
Tryhackme: https://tryhackme.com/p/cristi
Peerlyst: https://www.peerlyst.com/users/cristi-vlad
Discord: https://disboard.org/server/608756357801443343

Books I recommend for Penetration Testing and Ethical Hacking:

1. TJ O'Connor - Violent Python: https://amzn.to/31vH2GB
2. Dafydd Stuttard - Web App Hacker' s Handbook (2nd Ed): https://amzn.to/2MRcjk3
3. Peter Yaworski - Web Hacking 101: https://amzn.to/2KTvJSy
4. Jon Erickson - Hacking: The Art of Exploitation (2nd Ed):
https://amzn.to/2WHr3BD
5. Peter Kim - The Hacker Playbook 3 (2018): https://amzn.to/2MQiTXK
6. Peter Yaworski - Real-World Bug Hunting: https://amzn.to/37GB87K

It helps me tremendously if you support these educational videos:
https://www.patreon.com/cristivlad

My course Developing Ethical Hacking Tools with Python on Cybrary: http://bit.ly/2J5USbC





If you're a Youtuber, how can you survive without TubeBuddy? http://bit.ly/37dgFYr
Learn hands-on pentesting (free trial): http://bit.ly/2LzKrPJ
Hacker Wearables: http://bit.ly/2IDAQEo
Paperspace credit: https://paperspace.io/&R=FMXH1BN
DigitalOcean credit: https://m.do.co/c/efe4365e60bd

Short-clips via: https://mixkit.co/
__________

Whatever type of tests you're doing, only perform them in safe and legal environments and with the appropriate permissions.
__________

We begin a new subseries in cybersecurity. You're going to learn how to apply machine learning and deep learning to different aspects and subtopics of cybersecurity.

In the next few videos you're going to learn how to classify malware samples by PE headers.

Only perform these types of engagements in safe and legal environments and with the appropriate permissions.

References:

Chiheb Chebbi - Mastering Machine Learning for Penetration Testing: https://amzn.to/2EpcBbz

source

Tagged with:



0 Responses to Machine Learning for Malware Detection – 1 – Introduction