Podcast image

A Machine Learning Primer for the Blue Team | 10

Blueprint • 2020-08-11

Austin Taylor discusses the promise and reality of cyber security-centric data science, and how you can use machine learning for solving practical security problems.

Sponsor's Note:

Support for the Blueprint podcast comes from the SANS Institute.

Are you looking for the best in-depth training for your cyber defense team? Look no further than SANS blue team curriculum courses!

Whether you focus on network or host data, Windows or Linux, or even specialize in open source intel, SIEM, SOC, or defensive architecture, the SANS Blue Team curriculum has the course for you. From long-time classics like SEC503 Network Intrusion Detection to the newer SEC530 Defensible Security Architecture and Engineering and SEC487 Open Source Intelligence Gathering - we've got you covered, no matter what your specialty.

With an extensive archive of free webcasts on the SANS site, and free online demos available for most courses, you can easily check out the SANS blue team catalog and see which course is the best fit for you and your team.

Check out the constantly growing list of available courses at sansurl.com/blueteamops
Follow SANS Cyber Defense: Twitter | LinkedIn | YouTube
Follow John Hubbard: Twitter | LinkedIn

Featured Guest Bio:

Austin Taylor has an extensive background in Defensive and Offensive Cyber Operations and has performed incident response for some of the world's top Fortune companies. His expertise includes penetration testing, data science, threat hunting and User and Entity Behavioral Analytics (UEBA). He has taught data science courses for the last 3 years and is the author of "How to Build a World Class Monitoring System for Home, Small Office, or Enterprise Networks". In his off time, he teaches programming and conducts training at conferences. He currently serves as a Cyber Warfare Operator for the United States Air Force and is Director of Cybersecurity R&D at IronNet Cybersecurity. Austin holds multiple industry certifications including CISSP, GXPN, GMON, GCCC, GCIA, GCIH, GCPM, GSEC, GPEN, CEH, VCP, CCNA:Security.

Learn more about Austin.

Follow Austin Taylor on Twitter (@HuntOperator) and LinkedIn (/in/austintaylor/).