Machine Learning for Red Team Hackers

The Machine Learning for Red Team Hackers Learning Path covers various techniques related to hacking machine learning.

7 courses  //   34 videos  //   4 hours of training

Free training week — 1,400+ on-demand courses and hands-on labs

Machine Learning for Red Team Hackers training

Learn the ins and outs of hacking machine learning. The learning path covers topics such as hacking a CAPTCHA system, fuzzing a target, evading malware detection and attacking machine learning systems. You will also learn about deepfakes and how to perform backdoor attacks on machine learning.

Learning path components

Machine Learning for Red Team Hackers Assessment
Assessment
Machine Learning for Red Team Hackers Assessment

Machine Learning for Red Team Hackers Assessment

See how your machine learning hacking skills stack up against other professionals in your field.

Number of questions: 20

Introduction to Machine Learning for Red Team Hackers
Course
Introduction to Machine Learning for Red Team Hackers

Introduction to Machine Learning for Red Team Hackers

This course provides a brief overview of the learning path structure, as well as introduction to the code base you'll use.

2 videos
2 minutes of training

Hacking CAPTCHA Systems
Course
Hacking CAPTCHA Systems

Hacking CAPTCHA Systems

Learn how to automatically break through a CAPTCHA system in this course.

7 videos
117 minutes of training

Smart Fuzzing
Course
Smart Fuzzing

Smart Fuzzing

In this course, you'll write a custom evolutionary fuzzer that employs machine learning to fuzz a target. You'll also learn the machine learning behind, as well as how to use, AFL.

6 videos
50 minutes of training

Evading Machine Learning Malware Classifiers
Course
Evading Machine Learning Malware Classifiers

Evading Machine Learning Malware Classifiers

In this course, you'll learn how to modify malware so it is able to get past neural network and gradient boosting machine learning malware classifiers.

5 videos
21 minutes of training

Adversarial Machine Learning
Course
Adversarial Machine Learning

Adversarial Machine Learning

Learn how to perform white-box and black-box attacks on machine learning classifiers in this course.

5 videos
32 minutes of training

Deepfake
Course
Deepfake

Deepfake

This course helps you understand the implications of the deepfake technology, setup an environment for performing deepfakes and then create a deepfake video.

5 videos
26 minutes of training

Hacking Machine Learning
Course
Hacking Machine Learning

Hacking Machine Learning

Learn how to poison, backdoor and steal machine learning models in this course.

4 videos
13 minutes of training

 

What you’ll learn.

  • Attack machine learning systems
  • Construct malware to evade classifiers
  • Perform adversarial attacks to trick neural networks
  • Attack commercially available image recognition systems
  • Learn poisoning, backdoor attacks and model stealing on machine learning systems

Who is this for?

  • Red team members
  • Penetration testers
  • Malware researchers
  • Anyone interested in learning about hacking machine learning

Meet the author

Emmanuel Tsukerman

Dr. Tsukerman graduated from Stanford University and UC Berkeley. In 2017, his machine-learning-based anti-ransomware product won Top 10 Ransomware Products by PC Magazine. In 2018, he designed a machine-learning-based malware detection system for Palo Alto Network's WildFire service (over 30,000 customers). In 2019, Dr. Tsukerman authored the Machine Learning for Cybersecurity Cookbook and launched the Infosec Skills Cybersecurity Data Science Learning Path.

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec

Cybersecurity Culture — Quantified

See the data on the most overlooked variable in security and learn how to measure your organization's cybersecurity culture.