跳至主內容

Security Big Data & A.I. Analytic (SBDA) Training

 

Automated and A.I. based solutions have gained significance in Cyber Security, as this field is also facing the challenges of handling big data that has high volume in less time frame.

 

For those interested in the latest technological solutions to this challenge, the Security Big Data & A.I. Analytic course offers advanced training with hands-on exercises to them.

 

The 5-day course provides a high-level overview of the topics of log analysis, network, computer forensics, and malware analysis, followed by in-depth training about automated log analysis through statistical and AI-based solutions.

 

Register to save your seats now! Early bird or members of Supporting Organisations will enjoy discount (before 4 November 2022)!

 

DON’T WAIT, ACT NOW!!!

 

For more information, please visit here

發佈日期: 2022年07月29日

日期:2022年12月12日 - 2022年12月16日

時間:09:00 - 17:00

語言:英語

費用:HK$16,000

對象:The course is recommended for system administrators, incident response experts, security analysts and ethical hackers, who would like to gain up-to-date knowledge of the potential that the application of A.I. offers in their respective fields.

地點: Online Broadcast (HKPC Live)

組織: 香港生產力促進局(HKPC)

Course Outline

  • Day 1: The Principal of SBDA – Log Analysis
    • SBDA. How does it help in analysing the log data?
    • The Sources. Which sources to start with and how deep to go?
    • Log Collection. What actually should we look for?
    • Quick Analysis. Big Data or "Small" Data?
    • Below the 0 's and 1 's: Network and Computer Forensics
    • Regular tools to use in Forensics
    • Evidence - The sound of the truth
    • Ways to protect your pieces of evidence
  • Day 2: One Step Forward – Malware Analysis
    • How does malware analysis help in SBDA? Static & dynamic analysis
    • Tools for Static Analysis: Yara Rules, HexEditor, Pyew, AnalyzePE, PEscanner, PEframe, PEcheck
    • Framework for dynamic analysis: Cuckoo framework
    • Ready? Let's start to trace the malware now!
    • Threat Analysis. What actually happened behind the malicious codes?
    • The Smarter Techniques: Automated Log Analysis with Statistical and A.I. Solutions
    • Two More Advanced Techniques: Machine Learning Artificial Intelligence
  • Day 3: Dig, dig, dig… The Searching Techniques
    • Managing SQL & NoSQL databases - Similarities Differences
    • Use Elasticsearch to search for security data  
    • Visualise your search with Kibana Dashboard
    • Get your hands dirty - Analyse the malware with relevant tools, pragmatically triage an incident define level of severity and uncover hidden IoCs
  • Day 4: Minority Report: Time-based Correlations
    • The Databases
    • The Analytics
    • How do these link?
    • The Ultimate Goal - Predict the outcomes
  • Day 5: See the Unseen – Correlation Techniques
    • Get familiar with mathematical and statistical analysis to correlate with
    • Use simple but effective correlation matrices
    • Go back to your logs again and learn something you have not thought about before
    • Realize hidden correlations among past and present events and find the source of the security incident

For more information, please visit here