SlideShare a Scribd company logo
1
C
ouncilofInform
ation
Security
Getting closer to
BEGINNER’S SERIES – PART 1
BY MILAN
2
C
ouncilofInform
ation
Security
What’s the Agenda?
 Clearing our Basics
 Understanding AI ML DL
 There is more to it
 Setting up your Weapon
 Understand your Weapon
 Know the Libraries
 Run the Code
 What you want next?
3
C
ouncilofInform
ation
Security
Know your Trainer 4
Milan Singh Thakur
 Artificial Intelligence & Machine Learning Evangelist
 Executive Director – Future Technologies with CIS
 OWASP Mobile Project Global Leader
 International speaker, trainer, learner
C
ouncilofInform
ation
Security
What is the Confusion? 5
 Where to start from?
 Which course is better?
 Should I take online/offline training?
 Which direction will it take my career?
 Do I need to work with lot of math?
 Do I need to be a programmer?
 Will my colleagues understand what I am doing?
C
ouncilofInform
ation
Security
6
C
ouncilofInform
ation
Security
AI, ML and DL..??
Artificial
Intelligence
Machine
Learning
Deep Learning
7
C
ouncilofInform
ation
Security
Why to use ML now?
 Too much of data available
 Computational power is increasing
 Algorithmic research is breaking innovation barriers
 Increasing support and interest of industries
 ML + Cyber Security is, “The Endless Game”
 IoT and IIoT needs to be smarter
 Hackers have weaponized ML, when will you?
8
C
ouncilofInform
ation
Security
Applications of ML 9
C
ouncilofInform
ation
Security
10
C
ouncilofInform
ation
Security
Ex: Spam Filter using ML 11
C
ouncilofInform
ation
Security
Ex: Static Malware Analysis using ML 12
C
ouncilofInform
ation
Security
Check if you are “Still Awake” 13
 I want to calculate my share value. Which category?
 I want to understand what my customers are expecting in next
product?
 My defense system drone has to identify the enemy and execute?
 My bank detects ATM fraud very quickly, how?
 Face unlock on my mobile?
C
ouncilofInform
ation
Security
Leveraging ML in Industry
 Predictive maintenance
 Demand forecasting
 Workforce management
 Consumer buying patterns and recommendations
 Device monitoring, incident reporting, advanced analytics
 Airbus has launched “Factory of Future” – a Boeing creates nearly half
terabyte data during every flight
 Bentley uses it for quality vs customer satisfaction prediction
 IBM Watson is extensively used in Healthcare industry for patient data
analysis, diagnostics and help doctors for decision making
14
C
ouncilofInform
ation
Security
How you can get into Machine Learning?
 Get into basic courses by Andrew NG
 Install jupyter notebook – it has all you need (Yolo, PIL, pandas, sk-learn
& more)
 Run sample code: iris flower, object detection
 Understand you data
 Understand how labelling of data is done
 Look into how noise is removed
 Be wise to choose right algorithm
 Validate the output
15
C
ouncilofInform
ation
Security
Setting up you environment
 http://jupyter.org/install
 Download and install Anaconda with python3
 Download and install jupyter notebook
 Start the notebook server
 $Jupyter notebook
 Visit http://localhost:8888 for Notebook dashboard
16
C
ouncilofInform
ation
Security
Understanding Jupyter Notebook Dash
 Demo 
17
C
ouncilofInform
ation
Security
What Libraries to focus on?
 TensorFlow:
 Originally developed by researchers and engineers from the Google
Brain team within Google’s AI organization, it comes with strong support
for machine learning and deep learning and the flexible numerical
computation core is used across many other scientific domains.
 Numpy:
 Primarily used for scientific computing, has a powerful N-dimensional
array object, useful linear algebra, Fourier transform, and random
number capabilities
 OpenCV:
 Multi-core processing, hardware acceleration, real-time applications
Usage ranges from interactive art, to mines inspection, stitching maps
on the web or through advanced robotics
18
C
ouncilofInform
ation
Security
 Pandas:
 Library providing high-performance, easy-to-use data structures and
data analysis tools for the Python programming language
 PIL – Pilow
 The Python Imaging Library adds image processing capabilities to your
Python interpreter
 Yolo:
 You Only Look Once (YOLO), real-time object detection system based
on a Pascal Titan X it processes images at 30 FPS and has a mAP of
57.9% on COCO test-dev
 Scikit-learn:
 Simple and efficient tools for data mining and data analysis, Accessible
to everybody and reusable in various contexts. Built on NumPy, SciPy,
and matplotlib
 StatsModels
 matplotlib
19
C
ouncilofInform
ation
Security
What are my Algorithms? 20
Classification
SVM
Nearest
Neighbors
Random
Forest
Regression
SVR
Ridge
Regression
Clustering
K-Means
Spectral
Clustering
Mean shift
Dimensionality
Reduction
PCA
Feature
selection
Non-negative
matrix
factorization
Model
Selection
Grid search
Cross
validation
metrics
Preprocessing
Preprocessing
Feature
extraction
C
ouncilofInform
ation
Security
Run Run Run…!!
 Let’s run our first code of ML 
 See Object detection video using Yolo
21
C
ouncilofInform
ation
Security
What’s in Next Session (Part 2)…!!
 Jumping into Libraries
 Writing code for object detection
 Natural Language Processing (NLP)
 Neural Networks
 SVM
 Deep dive into Algorithms
 Decision Trees and Forests
22
C
ouncilofInform
ation
Security
“
”
A Vision to Secure the
Nation
COUNCIL OF INFORMATION SECURITY
Thank you for being part of this session. Your participation and feedback is
valuable for us.
Email us at: info@aimlglobal.org
23
C
ouncilofInform
ation
Security

More Related Content

PDF
Artificial Intelligence Techniques for Cyber Security
PPTX
Ai presentation on using of Artificial intelligence in smart cities
PPTX
Artificial intelligence
PDF
Security in the age of Artificial Intelligence
PDF
II-SDV 2017: Auto Classification: Can/Should AI replace You?
PDF
Stegnography projects
PDF
Deep learning @ Edge using Intel's Neural Compute Stick
PPTX
#DIS2017 - How can A.I. Help us build a better world
Artificial Intelligence Techniques for Cyber Security
Ai presentation on using of Artificial intelligence in smart cities
Artificial intelligence
Security in the age of Artificial Intelligence
II-SDV 2017: Auto Classification: Can/Should AI replace You?
Stegnography projects
Deep learning @ Edge using Intel's Neural Compute Stick
#DIS2017 - How can A.I. Help us build a better world

What's hot (6)

PDF
Smart Augmented Fields for Emergency Operations
PDF
OA_Cyber security course with AI
DOCX
ABSTRACTCONTENTABRIVIATION
PPTX
Cyber security with ai
PDF
NIPS - Deep learning @ Edge using Intel's NCS
PDF
Artificial intelligence in cyber defense
Smart Augmented Fields for Emergency Operations
OA_Cyber security course with AI
ABSTRACTCONTENTABRIVIATION
Cyber security with ai
NIPS - Deep learning @ Edge using Intel's NCS
Artificial intelligence in cyber defense
Ad

Similar to CIS AIML Beginners Series Part 1 (20)

PPTX
Enhance Security Domain with Machine Learning
PDF
influence of AI in IS
PDF
Python Machine Learning - Getting Started
PPTX
AI and Security
PPTX
AI Program Details by Enukollu Mahesh
PDF
Defcon 21-pinto-defending-networks-machine-learning by pseudor00t
PPTX
Machine Learning in Information Security by Mohammed Zuber
PDF
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
PDF
ML MODULE 1_slideshare.pdf
PDF
stackconf 2021 | Data Driven Security
PPTX
Machine learning in computer security
PDF
BSidesLV 2013 - Using Machine Learning to Support Information Security
PDF
Machine Learning for (DF)IR with Velociraptor: From Setting Expectations to a...
PPTX
Machine Learning by Sanjay Upadhyay
PPT
Machine learning and deep learning algorithms
PPTX
Unit - 1 - Introduction of the machine learning
PDF
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
PDF
Machine Learning Deep Learning AI and Data Science
PPTX
Internship - Python - AI ML.pptx
PPTX
Internship - Python - AI ML.pptx
Enhance Security Domain with Machine Learning
influence of AI in IS
Python Machine Learning - Getting Started
AI and Security
AI Program Details by Enukollu Mahesh
Defcon 21-pinto-defending-networks-machine-learning by pseudor00t
Machine Learning in Information Security by Mohammed Zuber
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
ML MODULE 1_slideshare.pdf
stackconf 2021 | Data Driven Security
Machine learning in computer security
BSidesLV 2013 - Using Machine Learning to Support Information Security
Machine Learning for (DF)IR with Velociraptor: From Setting Expectations to a...
Machine Learning by Sanjay Upadhyay
Machine learning and deep learning algorithms
Unit - 1 - Introduction of the machine learning
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
Machine Learning Deep Learning AI and Data Science
Internship - Python - AI ML.pptx
Internship - Python - AI ML.pptx
Ad

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
cuic standard and advanced reporting.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation theory and applications.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
Teaching material agriculture food technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectroscopy.pptx food analysis technology
MIND Revenue Release Quarter 2 2025 Press Release
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
cuic standard and advanced reporting.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
20250228 LYD VKU AI Blended-Learning.pptx
Electronic commerce courselecture one. Pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Programs and apps: productivity, graphics, security and other tools
Empathic Computing: Creating Shared Understanding
Encapsulation theory and applications.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.

CIS AIML Beginners Series Part 1

  • 2. Getting closer to BEGINNER’S SERIES – PART 1 BY MILAN 2 C ouncilofInform ation Security
  • 3. What’s the Agenda?  Clearing our Basics  Understanding AI ML DL  There is more to it  Setting up your Weapon  Understand your Weapon  Know the Libraries  Run the Code  What you want next? 3 C ouncilofInform ation Security
  • 4. Know your Trainer 4 Milan Singh Thakur  Artificial Intelligence & Machine Learning Evangelist  Executive Director – Future Technologies with CIS  OWASP Mobile Project Global Leader  International speaker, trainer, learner C ouncilofInform ation Security
  • 5. What is the Confusion? 5  Where to start from?  Which course is better?  Should I take online/offline training?  Which direction will it take my career?  Do I need to work with lot of math?  Do I need to be a programmer?  Will my colleagues understand what I am doing? C ouncilofInform ation Security
  • 7. AI, ML and DL..?? Artificial Intelligence Machine Learning Deep Learning 7 C ouncilofInform ation Security
  • 8. Why to use ML now?  Too much of data available  Computational power is increasing  Algorithmic research is breaking innovation barriers  Increasing support and interest of industries  ML + Cyber Security is, “The Endless Game”  IoT and IIoT needs to be smarter  Hackers have weaponized ML, when will you? 8 C ouncilofInform ation Security
  • 9. Applications of ML 9 C ouncilofInform ation Security
  • 11. Ex: Spam Filter using ML 11 C ouncilofInform ation Security
  • 12. Ex: Static Malware Analysis using ML 12 C ouncilofInform ation Security
  • 13. Check if you are “Still Awake” 13  I want to calculate my share value. Which category?  I want to understand what my customers are expecting in next product?  My defense system drone has to identify the enemy and execute?  My bank detects ATM fraud very quickly, how?  Face unlock on my mobile? C ouncilofInform ation Security
  • 14. Leveraging ML in Industry  Predictive maintenance  Demand forecasting  Workforce management  Consumer buying patterns and recommendations  Device monitoring, incident reporting, advanced analytics  Airbus has launched “Factory of Future” – a Boeing creates nearly half terabyte data during every flight  Bentley uses it for quality vs customer satisfaction prediction  IBM Watson is extensively used in Healthcare industry for patient data analysis, diagnostics and help doctors for decision making 14 C ouncilofInform ation Security
  • 15. How you can get into Machine Learning?  Get into basic courses by Andrew NG  Install jupyter notebook – it has all you need (Yolo, PIL, pandas, sk-learn & more)  Run sample code: iris flower, object detection  Understand you data  Understand how labelling of data is done  Look into how noise is removed  Be wise to choose right algorithm  Validate the output 15 C ouncilofInform ation Security
  • 16. Setting up you environment  http://jupyter.org/install  Download and install Anaconda with python3  Download and install jupyter notebook  Start the notebook server  $Jupyter notebook  Visit http://localhost:8888 for Notebook dashboard 16 C ouncilofInform ation Security
  • 17. Understanding Jupyter Notebook Dash  Demo  17 C ouncilofInform ation Security
  • 18. What Libraries to focus on?  TensorFlow:  Originally developed by researchers and engineers from the Google Brain team within Google’s AI organization, it comes with strong support for machine learning and deep learning and the flexible numerical computation core is used across many other scientific domains.  Numpy:  Primarily used for scientific computing, has a powerful N-dimensional array object, useful linear algebra, Fourier transform, and random number capabilities  OpenCV:  Multi-core processing, hardware acceleration, real-time applications Usage ranges from interactive art, to mines inspection, stitching maps on the web or through advanced robotics 18 C ouncilofInform ation Security
  • 19.  Pandas:  Library providing high-performance, easy-to-use data structures and data analysis tools for the Python programming language  PIL – Pilow  The Python Imaging Library adds image processing capabilities to your Python interpreter  Yolo:  You Only Look Once (YOLO), real-time object detection system based on a Pascal Titan X it processes images at 30 FPS and has a mAP of 57.9% on COCO test-dev  Scikit-learn:  Simple and efficient tools for data mining and data analysis, Accessible to everybody and reusable in various contexts. Built on NumPy, SciPy, and matplotlib  StatsModels  matplotlib 19 C ouncilofInform ation Security
  • 20. What are my Algorithms? 20 Classification SVM Nearest Neighbors Random Forest Regression SVR Ridge Regression Clustering K-Means Spectral Clustering Mean shift Dimensionality Reduction PCA Feature selection Non-negative matrix factorization Model Selection Grid search Cross validation metrics Preprocessing Preprocessing Feature extraction C ouncilofInform ation Security
  • 21. Run Run Run…!!  Let’s run our first code of ML   See Object detection video using Yolo 21 C ouncilofInform ation Security
  • 22. What’s in Next Session (Part 2)…!!  Jumping into Libraries  Writing code for object detection  Natural Language Processing (NLP)  Neural Networks  SVM  Deep dive into Algorithms  Decision Trees and Forests 22 C ouncilofInform ation Security
  • 23. “ ” A Vision to Secure the Nation COUNCIL OF INFORMATION SECURITY Thank you for being part of this session. Your participation and feedback is valuable for us. Email us at: info@aimlglobal.org 23 C ouncilofInform ation Security