Call +60 3-2711 7241 Email: malaysiacourses@tertiaryinfotech.com

HRDF Approved Training Provider in Malaysia - Modular Fast Track Skill-Based Trainings

Machine Learning for Network Security

With advancement in technology, organizations are now able to collect a large amount of data that are being generated and transferred over the network. Cybersecurity experts may have a hard time monitoring and analysing this data due to the sheer volume which is beyond their capacity to manage. One possible solution that is being widely explored is to use Machine Learning and Data Mining methods for cybersecurity related problems.

Methods of machine learning and data mining can help to build better detectors from massive amounts of complex data that is generated over the Internet. Such methods can also help discover the information required to build more secure systems.

Data can be gathered from a combination of software installed on customer workstations and sensors placed in network segments. This data can be fed to systems that use machine learning which can classify the incoming samples and can distinguish between normal behaviour and any anomalies. Historical data and patterns can be used to compare samples and identify evolving threats.

This course will give you a broad introduction to network security and related cybersecurity problems. It will also explore various machine learning and data mining solutions to cybersecurity problems. The module will focus on the following

  • Introduction to Network Security concepts
  • Basic Functions of Firewalls 
  • Intrusion Detection and Prevention Systems 
  • Collections of application and network data 
  • Apply machine learning solutions to cybersecurity problems

Each module will include a brief description of the related theoretical concepts followed by a related hands-on workshop.

HRDF SBL Claimable for Employers Registered with HRDF

HRDF claimable

Course Code: M553

Course Booking

MYR880.00

Course Date

Course Time

* Required Fields

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.


Course Details

Module 1: Introduction to Network Security Concepts

  • Challenges to Securing Information
  • Core principles of Information Security
  • Types of Network Attacks
  • Malware

Module 2: Introduction to Firewalls

  • Types of Firewalls
  • Firewall Design and Architecture
  • Configuring Firewalls

Module 3: Intrusion Detection and Prevention Systems

  • Types of IDS
  • Host and Network based IDS
  • IPS
  • Honeypots
  • Introduction to Snort


Module 4: Introduction to Data Mining and Machine Learning Concepts

  • Supervised /Unsupervised Machine Learning Methods
  • Challenges in Data Mining and Machine Learning


Module 5: Data Collection and Analysis

  • Machine Learning for Anomaly Detection
  • Machine Learning in Intrusion Detection
  • Machine Learning and Network Traffic
  • Emerging Challenges in Cybersecurity

Module 6: Network Forensics

  • Forensic Principles
  • Capturing Network Traffic
  • Use of Cyber Forensic Tools
  • Legal issues

Who Should Attend

  • Cyber Security Stuff
  • Network Engineers
  • IT Administrators

Prerequisite

Nil

Trainers

Network Security TrainerTruman Ng graduated with Bachelor Degree in Electrical Engineering from NUS in year 2002. He designed Artificial Intelligence (AI) controller for DC-DC Power Convertor by using Fuzzy Logic and Neural Network (NN) as his university Final Year Project.

Truman has over 15 years project experiences across Database & Web Design, PLC machinery, Data Center Design , Structure Cabling System(SCS) and Enterprise Network Design and Implementation. He used to be a network architect for Hewlett Packard, working with a group of virtual team from the US in handling network design and projects in the States.

Truman is the founder of Nexplore (S) Pte Ltd. He provides solutions of Cloud SaaS, IaaS & PaaS and Software Defined Network (SDN), VoIP and Internet Security. He was engaged by Huawei Global Training Center to provide 60+ consultations and trainings for Internet Service Providers(ISP) from Malaysia, Singapore, Brunei, Philipines, Australia, Poland, Iran, South Africa, Swaziland, Cote Dlvoire, Syria, Uzbekistan, New Zealand and countries over the world.
As achievement, Truman has successfully completed 100+ IT network projects for Bank, Hotel and Factory within 5 years.
Truman is certified in PMP, Cisco CCNP, CCIP, CCDP, HP Ase and Huawei HCNP, HCIE R&S, HCNA Cloud, HCNA Security, etc.

Network Security TrainerYaw Hon Sing started his IT training career back in 1996 attached to New Horizons Computer Learning Centre (NHCLC) Malaysia. Achieved his Microsoft Certified Trainer (MCT) status back in 1997 delivering Microsoft backend server trainings (Windows NT/2000/2003 & Exchange Server & ISA Server) for the enterprise deployment. Moving forward he achieved vendor neutral certification COMPTIA A+, Network+, Security+ and Server+ to endorse his knowledge in the relevant fields. After years with server-based trainings, Yaw moved onto network /internetworking and network storage solutions with Cisco Systems & Netapp training & certification. He was a Cisco Systems & NetApp certified system instructor. He was certified in CCNA and CCNP majoring in routing & switching, Wireless LAN, Network Security, and Service Provider internetworking. At the recent training career, he diversified into Huawei Technologies’ carrier network solutions. Attaining his full range of Huawei Technologies professional certification tracks: Huawei Certified HCNA, HCNP and HCIE in Routing & Switching series. At present, he is continuously pursuing his security practitioner certification CISSP.

Write Your Own Review

You're reviewing: Machine Learning for Network Security

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha

Tags

Use spaces to separate Subjects. Use single quotes (') for phrases.

You May Be Interested In These Courses