Hunting for Malicious Infrastructure Using Big Data

This course aims to teach learners how to use machine learning methods to hunt for anomalies in HTTP responses and identify malicious infrastructure, specifically command and control (C&C) servers. The course covers feature extraction methods for analyzing HTTP response headers, advantages and disadvantages of different machine learning techniques, and the importance of identifying C&C servers for network protection. The intended audience for this course includes cybersecurity professionals, data analysts, and individuals interested in using big data for threat detection.

https://www.classcentral.com/course/youtube-hitbcw2021-d1-hunting-for-malicious-infrastructure-using-big-data-by-freek-bax-and-shadi-alhakimi-166305


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Big Data Labs
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.