What you'll learn Introduce you to Intrusion Detection. Use python and machine learning for intrusion detection. Identify a machine learning problem type if classification or regression. Master best practice for machine learning data preparation.
Requirements Basics of python 3 programing language. Be familiar with fundamental Machine learning concepts. Have a computer (either Mac, Windows, or Linux). Desire to learn!. Description This course will introduce you to the intrusion detection domain and how to use machine learning algorithms to build intrusion detection models with best practices. You will get a solid foundation for using applied machine learning for intrusion detection.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. The theoretical Concepts/1. Course overview.mp4
8 MB
~Get Your Files Here !/1. The theoretical Concepts/1. Course overview.srt
2.4 KB
~Get Your Files Here !/1. The theoretical Concepts/10. Model Prediction Types.mp4
17.1 MB
~Get Your Files Here !/1. The theoretical Concepts/10. Model Prediction Types.srt
5.3 KB
~Get Your Files Here !/1. The theoretical Concepts/11. Performance Evaluation Metrics.mp4
12.8 MB
~Get Your Files Here !/1. The theoretical Concepts/11. Performance Evaluation Metrics.srt
4.6 KB
~Get Your Files Here !/1. The theoretical Concepts/2. Prerequisites of the course.mp4
8.9 MB
~Get Your Files Here !/1. The theoretical Concepts/2. Prerequisites of the course.srt
1.8 KB
~Get Your Files Here !/1. The theoretical Concepts/3. What is intrusion detection.mp4
17.8 MB
~Get Your Files Here !/1. The theoretical Concepts/3. What is intrusion detection.srt
4 KB
~Get Your Files Here !/1. The theoretical Concepts/4. How applied machine learning can be used for intrusion detection.mp4
12.2 MB
~Get Your Files Here !/1. The theoretical Concepts/4. How applied machine learning can be used for intrusion detection.srt
3.4 KB
~Get Your Files Here !/1. The theoretical Concepts/5. How to build an intrusion detection Model.mp4
27.2 MB
~Get Your Files Here !/1. The theoretical Concepts/5. How to build an intrusion detection Model.srt
5.4 KB
~Get Your Files Here !/1. The theoretical Concepts/6. Data Preparation.mp4
13.8 MB
~Get Your Files Here !/1. The theoretical Concepts/6. Data Preparation.srt
2.3 KB
~Get Your Files Here !/1. The theoretical Concepts/7. Features Encoding.mp4
14.6 MB
~Get Your Files Here !/1. The theoretical Concepts/7. Features Encoding.srt
2.1 KB
~Get Your Files Here !/1. The theoretical Concepts/8. Features Scaling.mp4
12.4 MB
~Get Your Files Here !/1. The theoretical Concepts/8. Features Scaling.srt
1.8 KB
~Get Your Files Here !/1. The theoretical Concepts/9. Features Selection.mp4
9 MB
~Get Your Files Here !/1. The theoretical Concepts/9. Features Selection.srt
1.9 KB
~Get Your Files Here !/2. Practical Section/1. Loading And Exploring The Dataset.mp4
34.7 MB
~Get Your Files Here !/2. Practical Section/1. Loading And Exploring The Dataset.srt
4.6 KB
~Get Your Files Here !/2. Practical Section/1.1 Course source code.ipynb
86 KB
~Get Your Files Here !/2. Practical Section/1.2 IDS Dataset.csv
2.7 MB
~Get Your Files Here !/2. Practical Section/2. Encoding Dataset Using Label Encoder.mp4
34.8 MB
~Get Your Files Here !/2. Practical Section/2. Encoding Dataset Using Label Encoder.srt
5.9 KB
~Get Your Files Here !/2. Practical Section/3. Checking The Dataset Balancing Status.mp4
37.7 MB
~Get Your Files Here !/2. Practical Section/3. Checking The Dataset Balancing Status.srt
7.4 KB
~Get Your Files Here !/2. Practical Section/4. Scaling Dataset The Wrong Way.mp4
38.8 MB
~Get Your Files Here !/2. Practical Section/4. Scaling Dataset The Wrong Way.srt
8 KB
~Get Your Files Here !/2. Practical Section/5. Scaling Dataset Best Practice.mp4
15.3 MB
~Get Your Files Here !/2. Practical Section/5. Scaling Dataset Best Practice.srt
2.6 KB
~Get Your Files Here !/2. Practical Section/6. Features Selection Using Gini Index.mp4
46.6 MB
~Get Your Files Here !/2. Practical Section/6. Features Selection Using Gini Index.srt
8.5 KB
~Get Your Files Here !/2. Practical Section/7. Build IDS Model Using The UNSW_NB15 Dataset.html