Machine Learning for Red Team Hackers
Rated 3.5/5 based on 11 customer reviews

Machine Learning for Red Team Hackers

Available: Out of Stock
$0.00

Request Info
Learn the ins and outs of hacking machine learning. The learning path covers topics such as hacking a CAPTCHA system, fuzzing a target, evading malware detection and attacking machine learning systems. You will also learn about deepfakes and how to perform backdoor attacks on machine learning.

Skill Assessment

Skill assessment | 20 questions

See how your Machine Learning for Red Team Hackers skills stack up against other professionals in your field.

Introduction to Machine Learning for Red Team Hackers

Course | 2 minutes

Get an overview of what to expect in the Machine Learning for Red Team Hackers Learning Path, including highlights of course topics and a brief description of the path’s hands-on assignments.

Hacking CAPTCHA Systems

Course | 1 hour 57 minutes

Learn how to implement and use a CAPTCHA-evading bot from scratch, including training and designing a deep neural network, using selenium to automate the CAPTCHA evasion and using the created bot on a webpage designed to be attacked.

Smart Fuzzing

Course | 49 minutes

In this course, you’ll write a custom evolutionary fuzzer that employs machine learning to fuzz a target. You’ll also learn the machine learning behind, as well as how to use, AFL.

Evading Machine Learning Malware Classifiers

Course | 21 minutes

In this course, you’ll learn how to modify malware so it is able to get past neural network and gradient boosting machine learning malware classifiers

Adversarial Machine Learning

Course | 33 minutes

Learn how to perform white-box and black-box attacks on machine learning classifiers in this course.

Deepfake

Course | 26 minutes

This course helps you understand the implications of the deepfake technology, setup an environment for performing deepfakes and then create a deepfake video.

Hacking Machine Learning

Course | 14 minutes

This course will teach you some of the darker, less publicized attacks on machine learning, including how to poison, backdoor and steal machine learning models.

Learn the ins and outs of hacking machine learning. The learning path covers topics such as hacking a CAPTCHA system, fuzzing a target, evading malware detection and attacking machine learning systems. You will also learn about deepfakes and how to perform backdoor attacks on machine learning.

Skill Assessment

Skill assessment | 20 questions

See how your Machine Learning for Red Team Hackers skills stack up against other professionals in your field.

Introduction to Machine Learning for Red Team Hackers

Course | 2 minutes

Get an overview of what to expect in the Machine Learning for Red Team Hackers Learning Path, including highlights of course topics and a brief description of the path’s hands-on assignments.

Hacking CAPTCHA Systems

Course | 1 hour 57 minutes

Learn how to implement and use a CAPTCHA-evading bot from scratch, including training and designing a deep neural network, using selenium to automate the CAPTCHA evasion and using the created bot on a webpage designed to be attacked.

Smart Fuzzing

Course | 49 minutes

In this course, you’ll write a custom evolutionary fuzzer that employs machine learning to fuzz a target. You’ll also learn the machine learning behind, as well as how to use, AFL.

Evading Machine Learning Malware Classifiers

Course | 21 minutes

In this course, you’ll learn how to modify malware so it is able to get past neural network and gradient boosting machine learning malware classifiers

Adversarial Machine Learning

Course | 33 minutes

Learn how to perform white-box and black-box attacks on machine learning classifiers in this course.

Deepfake

Course | 26 minutes

This course helps you understand the implications of the deepfake technology, setup an environment for performing deepfakes and then create a deepfake video.

Hacking Machine Learning

Course | 14 minutes

This course will teach you some of the darker, less publicized attacks on machine learning, including how to poison, backdoor and steal machine learning models.