IT & Software Data Science and Machine Learning for Infosec | Pentester Academy (1 Viewer)

Currently reading:
 IT & Software Data Science and Machine Learning for Infosec | Pentester Academy (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

protectaccount

Member
Amateur
LV
4
Joined
Nov 21, 2025
Threads
1,144
Likes
104
Awards
9
Credits
23,370©
Cash
0$
OHrC6AB.png


The age of intelligent machines is here! We are now seeing Machine Learning disrupting every technological field including computer security. As more and more security products use Machine Learning, it is important as Pentesters and Security Researchers to understand how to make and break this technology!


Overview


1 Course Introduction
2 Lab Setup and Installation
3 Module 1: Pandas Part 1
4 Module 1: Pandas Part 2
5 Module 1: Pandas Part 3
6 Module 1: Pandas Part 4
7 Module 2: K Nearest Neighbors (KNN) Part 1
8 Module 2: K Nearest Neighbors (KNN) Part 2
9 Module 2: K Nearest Neighbors (KNN) Part 3
10 Module 2: K Nearest Neighbors (KNN) Part 4
11 Module 3: Model Evaluation and Linear Regression Part 1
12 Module 3: Model Evaluation and Linear Regression Part 2
13 Module 3: Model Evaluation and Linear Regression Part 3
14 Module 3: Model Evaluation and Linear Regression Part 4
15 Module 4: Logistic Regression Part 1
16 Module 4: Logistic Regression Part 2
17 Module 4: Logistic Regression Part 3
18 Module 4: Logistic Regression Part 4
19 Module 5: Natural Language Processing Part 1
20 Module 5: Natural Language Processing Part 2
21 Module 5: Natural Language Processing Part 3
22 Module 5: Natural Language Processing Part 4
23 Module 6: Naive Bayes Classification Part 1
24 Module 6: Naive Bayes Classification Part 2
25 Module 6: Naive Bayes Classification Part 3
26 Module 6: Naive Bayes Classification Part 4
27 Module 7: Advanced Scikit Learn Part 1
28 Module 7: Advanced Scikit Learn Part 2
29 Module 8: Decision Trees Part 1
30 Module 8: Decision Trees Part 2
31 Module 8: Decision Trees Part 3
32 Module 9: Ensembling Techniques Part 1
33 Module 9: Ensembling Techniques Part 2
34 Module 9: Ensembling Techniques Part 3
35 Module 9: Ensembling Techniques Part 4
36 Module 10: Dimension Reduction Part 1
37 Module 10: Dimension Reduction Part 2
38 Module 10: Dimension Reduction Part 3
39 Module 11: Clustering Part 1
40 Module 11: Clustering Part 2
41 Module 11: Clustering Part 3
42 Module 12: Stochastic Gradient Descent Part 1
43 Module 12: Stochastic Gradient Descent Part 2
44 Module 12: Stochastic Gradient Descent Part 3
45 Module 13: Neural Networks – Deep Learning Part 1
46 Module 13: Neural Networks – Deep Learning Part 2
47 Module 13: Neural Networks – Deep Learning Part 3
48 Module 14: Recommendations Engine Part 1
49 Module 14: Recommendations Engine Part 2
50 Case Study: Detecting Malicious URLs

Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom