Videos

Published on March 22nd, 2019 📆 | 3091 Views ⚑

0

Machine Learning for Malware Detection – 6 – Coding the Classifier – Part 2


https://www.ispeech.org/text.to.speech



Python for Pentesters course: http://bit.ly/2I0sRkm
Python Basics course: http://bit.ly/37cmhlx

Join me and other cyber-geeks on discord: http://bit.ly/2KH6aST
Join my SQUAD (for discounts'n'stuff): http://bit.ly/2xhSvM2

Hire me as a penetration tester: https://dgtsec.com/penetration-testing-services/
101 Pentesting Training: https://dgtsec.com/cybersec-pentesting-training/
101 Cybersecurity Consulting: https://dgtsec.com/cybersec-pentesting-training/

Connect with me:

Linkedin: https://www.linkedin.com/in/cristivlad/
Twitter: https://twitter.com/CristiVlad25
Facebook page: https://www.facebook.com/CristiVladZ/
Facebook group: https://www.facebook.com/groups/cybersecpros/
Hackthebox: https://www.hackthebox.eu/profile/27034
Tryhackme: https://tryhackme.com/p/cristi
Peerlyst: https://www.peerlyst.com/users/cristi-vlad
Discord: https://disboard.org/server/608756357801443343

Books I recommend for Penetration Testing and Ethical Hacking:

1. TJ O'Connor - Violent Python: https://amzn.to/31vH2GB
2. Dafydd Stuttard - Web App Hacker' s Handbook (2nd Ed): https://amzn.to/2MRcjk3
3. Peter Yaworski - Web Hacking 101: https://amzn.to/2KTvJSy
4. Jon Erickson - Hacking: The Art of Exploitation (2nd Ed):
https://amzn.to/2WHr3BD
5. Peter Kim - The Hacker Playbook 3 (2018): https://amzn.to/2MQiTXK
6. Peter Yaworski - Real-World Bug Hunting: https://amzn.to/37GB87K

It helps me tremendously if you support these educational videos:
https://www.patreon.com/cristivlad

My course Developing Ethical Hacking Tools with Python on Cybrary: http://bit.ly/2J5USbC





If you're a Youtuber, how can you survive without TubeBuddy? http://bit.ly/37dgFYr
Learn hands-on pentesting (free trial): http://bit.ly/2LzKrPJ
Hacker Wearables: http://bit.ly/2IDAQEo
Paperspace credit: https://paperspace.io/&R=FMXH1BN
DigitalOcean credit: https://m.do.co/c/efe4365e60bd

Short-clips via: https://mixkit.co/
__________

Whatever type of tests you're doing, only perform them in safe and legal environments and with the appropriate permissions.
__________

In this series you'll learn how to apply machine learning in cybersecurity.

In this video we train a Random Forest classifier on a malware dataset so that it learns to distinguish between legitimate and malware samples. We also look at a confusion matrix for this machine learning algorithm.

References:

Chiheb Chebbi - Mastering Machine Learning for Penetration Testing: https://amzn.to/2EpcBbz

Only perform these types of engagements in safe and legal environments and with the appropriate permissions.

source

Tagged with:



0 Responses to Machine Learning for Malware Detection – 6 – Coding the Classifier – Part 2