Wenn Sie sich für diesen Kurs anmelden, werden Sie auch für diese Spezialisierung angemeldet.
Lernen Sie neue Konzepte von Branchenexperten
Gewinnen Sie ein Grundverständnis bestimmter Themen oder Tools
Erwerben Sie berufsrelevante Kompetenzen durch praktische Projekte
Erwerben Sie ein Berufszertifikat zur Vorlage
In diesem Kurs gibt es 5 Module
The course "Machine Learning and Emerging Technologies in Cybersecurity" offers an in-depth exploration of machine learning applications in cybersecurity, focusing on techniques for threat detection and prevention. Participants will gain a solid grounding in machine learning fundamentals, including neural networks, clustering, and support vector machines, tailored specifically for cybersecurity contexts. Unique to this course is the integration of machine learning with Intrusion Detection Systems (IDS), equipping learners with practical skills to enhance threat detection capabilities.
Additionally, the course examines Tor networking, providing insights into secure and anonymous communication systems, as well as the critical role of IDS within Cyber Security Incident Response Teams (CSIRTs) in enterprise environments. By the end of the course, learners will not only understand how to apply advanced machine learning techniques but also be proficient in tools like RapidMiner and Security Onion. This blend of theory and hands-on application ensures that participants leave with the skills needed to tackle real-world cybersecurity challenges effectively, making this course a vital resource for those looking to advance their careers in cybersecurity and data science.
This course provides a comprehensive introduction to machine learning and data mining, covering key algorithms and tools like RapidMiner and Security Onion. Students will explore advanced topics such as neural networks, clustering, and support vector machines, while also learning to evaluate model performance through confusion matrices and ROC curves. Additionally, the course delves into ToR architecture, privacy concerns, and the practical installation of ToR clients. Emphasis will be placed on incident response within Computer Security Incident Response Teams (CSIRTs) and effective information-sharing practices. By the end of the course, participants will have a robust understanding of both machine learning techniques and their applications in cybersecurity.
The course delves deeper into specific approaches, including neural networks, clustering, and support vector machines (SVMs), providing students with a solid foundation in both the theory and practice of these advanced techniques.
Introduction to Machine Learning Concepts •20 Minuten
Neural Networks•16 Minuten
Clustering•14 Minuten
Help Vector Machines•16 Minuten
3 Lektüren•Insgesamt 220 Minuten
Reading References•90 Minuten
Reading References•90 Minuten
Self-Reflective Reading: AI, Ethics, and Military Collaboration•40 Minuten
3 Aufgaben•Insgesamt 90 Minuten
Introduction to Machine Learning and Data Mining•15 Minuten
Implementing and Evaluating IBM Watson for Fraud Detection•15 Minuten
Machine Learning I•60 Minuten
2 Unbewertete Labore•Insgesamt 120 Minuten
Practice Lab: Building and Training a Neural Network with Keras•60 Minuten
Practice lab: Implementing and Tuning a Perceptron in Python•60 Minuten
3 Plug-ins•Insgesamt 43 Minuten
Assurance for Machine Learning Video•15 Minuten
RapidMiner Example•15 Minuten
Deep Learning Using Keras – Training Neural Network•13 Minuten
Machine Learning II
Modul 3•9 Stunden abzuschließen
Moduldetails
This course explores the integration of Machine Learning (ML) algorithms into Intrusion Detection Systems (IDS) to enhance threat detection capabilities.
Das ist alles enthalten
3 Videos4 Lektüren3 Aufgaben5 Plug-ins
Infos zu Modulinhalt anzeigen
3 Videos•Insgesamt 27 Minuten
Introduction•3 Minuten
Choosing an ML Algorithm•5 Minuten
Applying ML to ID•20 Minuten
4 Lektüren•Insgesamt 360 Minuten
Reading References•120 Minuten
Reading References•120 Minuten
Self-Reflective Reading: Exploring Machine Learning in Intrusion Detection Systems•60 Minuten
Self-Reflective Reading: Analyzing Netflow Data and Machine Learning Models in Cybersecurity•60 Minuten
3 Aufgaben•Insgesamt 90 Minuten
Types of Machine Learning Algorithms and their Application in IDS•15 Minuten
Challenges in Implementing ML in IDS and Evaluation Techniques•15 Minuten
Machine Learning II•60 Minuten
5 Plug-ins•Insgesamt 63 Minuten
Enigma Talk by Jeremy Howard on Deep Learning (Optional)•20 Minuten
Data Preparation•9 Minuten
Applying the Model•7 Minuten
Building the Model•19 Minuten
Validating a Model•8 Minuten
ToR Networking
Modul 4•9 Stunden abzuschließen
Moduldetails
This course provides a comprehensive understanding of The Onion Router (ToR) architectures, focusing on the critical components that make up this secure and anonymous communication system.
Das ist alles enthalten
5 Lektüren3 Aufgaben2 Plug-ins
Infos zu Modulinhalt anzeigen
5 Lektüren•Insgesamt 410 Minuten
Reading References•120 Minuten
Reading References•120 Minuten
ToR History & Data Anonymization•90 Minuten
Self-Reflective Reading: Exploring Neural Networks and Intrusion Detection in ToR Networks•40 Minuten
Self-Reflective Reading: Understanding Tor Network Anonymity and Security•40 Minuten
3 Aufgaben•Insgesamt 90 Minuten
Introduction to ToR Architectures and Node Types•15 Minuten
ToR Relays, Security Concerns, and Data Anonymization•15 Minuten
ToR Networking•60 Minuten
2 Plug-ins•Insgesamt 37 Minuten
ToR Networking Video•35 Minuten
DJ Ware - Discussion of "The Onion Router" ToR•2 Minuten
IDS in Context
Modul 5•12 Stunden abzuschließen
Moduldetails
This module explores the critical role of Intrusion Detection Systems (IDS) within Cyber Security Incident Response Teams (CSIRTs), particularly in high-volume enterprise environments.
Das ist alles enthalten
7 Videos7 Lektüren4 Aufgaben4 Plug-ins
Infos zu Modulinhalt anzeigen
7 Videos•Insgesamt 127 Minuten
Introduction•4 Minuten
Forming a CSIRT•23 Minuten
IDS Response Process•28 Minuten
Information Sharing•20 Minuten
Future Applications of IDS/IPS•14 Minuten
Technical Challenges Yet to Be Resolved•23 Minuten
Where to Get Information on the Future of IDS/IPS?•16 Minuten
7 Lektüren•Insgesamt 300 Minuten
Reading References•60 Minuten
Concrete Steps for Implementing an Information Security Program•20 Minuten
Crisis Communications During a Security Incident•20 Minuten
Reading References•60 Minuten
Reading References•60 Minuten
Self-Reflective Reading: Analyzing the Cyber Intelligence Sharing and Protection Act (CISPA)•40 Minuten
Self-Reflective Reading: Integrating IDS and CSIRT in Cybersecurity and Evaluating CISA•40 Minuten
4 Aufgaben•Insgesamt 105 Minuten
Forming and Managing a CSIRT•15 Minuten
Executing IDS Response Processes with Security Onion•15 Minuten
Emerging Trends and Future Challenges in Intrusion Detection and Prevention Systems (IDS/IPS)•15 Minuten
IDS in Context•60 Minuten
4 Plug-ins•Insgesamt 176 Minuten
Learning Rules for Anomaly Detection •60 Minuten
The New Fundamentals of Security - Mike Fey - RSA Conference US 2013 Keynote•28 Minuten
Big Data Redefines Security - Arthur Coviello, Jr. - RSA Conference US 2013 Keynote (14E)•31 Minuten
Tech Talk on How to Detect Intruders Already in Your System •57 Minuten
Erwerben Sie ein Karrierezertifikat.
Fügen Sie dieses Zeugnis Ihrem LinkedIn-Profil, Lebenslauf oder CV hinzu. Teilen Sie sie in Social Media und in Ihrer Leistungsbeurteilung.
The mission of The Johns Hopkins University is to educate its students and cultivate their capacity for life-long learning, to foster independent and original research, and to bring the benefits of discovery to the world.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.