Big data for cyber security

Learn about the anomalies and basic methods of anomaly detection based on cyber-attacks.

Goals:

  • Learn about the system for capturing cyber-attack data and creating a cyber-data stream
  • Understand the data flows and methods for analyzing data flows in the case of cyber attacks
  • Understand the anomalies and basic methods of anomaly detection based on cyber attack data

 

Difficulty:
Type:LecturePracticeDemonstration
Status:Closing date exceeded
Duration:1 day
Tutor:Matej Kren
Location: Fakulteta za elektrotehniko
Tržaška 25
1000 Ljubljana
Fees:470+ddv
Inquiry
Apply as
Individual
Organisation
Student
Status: Closing date exceeded

Newsletter