I recently had the privilege of conducting a workshop on the importance of being a purple teamer within a Security Operations Center (SOC) at the Moroccan Cybers Camp (MCC) organized by ENSA University Cadi Ayyad Marrakech Innovation City. The event, focused on "Cloud Security," aimed to bring together cybersecurity professionals
Greetings, fellow cybersecurity enthusiasts! I recently had the privilege of conducting a captivating workshop on the significance of threat hunting at ENSIAS University's Mohammed V through their yearly Cyber event MCSC. My name is Omar Jellouli, and I go by the alias "Fr33s0ul" in the cybersecurity community. It was truly
Adversarial machine learning Adversarial machine learning exploits how artificial intelligence algorithms work to disrupt the conduct of artificial intelligence algorithms. In the past years, adversarial machine learning has become an active zone of research as the job of AI continues to grow in vast numbers of the applications we use.
Convolutional Neural Networks (CNNs) A Convolutional Neural Networks (CNNs) is a Deep Learning algorithm which can take in an input picture, appoint significance (learnable weights and biases) to different articles in the image and have the option to separate one from the other. The pre-processing required in a CNNs; it
Dimensionality reduction is a set of machine learning-based indicative models. They are useful to execute data manipulation; it decreases the dimensionality of a dataset. It is instrumental in cases where the issue becomes intractable, and the quantity of variables increases, then dimensionality reduction leads to choosing significant variables. * Low variance
Now that we covered a fair amount of the components and instruments involving in the AI systems, it is the time to talk a little about performance evaluation and its importance. Performance evaluation is an essential step in a methodological operation. Because after finishing the whole machine learning model, testing
Artificial neural networks Artificial neural networks are one of the trending topics in nowadays, Applications based on this type of technology imitate the sophisticated functionality of the human brain, where neurons process information in parallel. Researchers have successfully proved the concept by creating prototypes and successful models, for example, pattern
Unsupervised learning The distinction in unsupervised learning from supervised learning, as it may have surmised the data will not contain any labels, and the module should attempt prospects and learn without a teacher. Semi-supervised learning The semi-supervised learning algorithm is a combination of supervised learning and unsupervised. The algorithms run
Cybersecurity field grew so fast that now the industry needs many cybersecurity professionals to defend and patch issues in networks and web applications before cybercriminals attempt to do it. Still, thankfully we have nowadays a lot of conferences and many people working together to make the internet a better internet.
Hello everyone, here's a quick write-up about LFI that I really recommend for people just starting in the field. It's created by a user called falconfeast feel free to visit his room. TryHackMe | Cyber Security TrainingAn online platform for learning and teaching cyber security, all through your browser.TryHackMe Enumeration