Machine Learning investigates the mechanisms by which knowledge is acquired through experience. The intent of this course is to cover the primary approaches to machine learning from a variety of fields, including inductive inference of decision trees, neural network learning, statistical learning methods, generic algorithms, Bayesian methods, Information-Theoretic classification, and reinforcement learning. These various approaches will be compared and contrasted in order to determine under which conditions each is most appropriate.
Presents formal specifications of abstract data types and their data structure representations, operations, and algorithms. Includes priority queues, dictionaries, graphs, heaps, hash tables, binary search trees, balanced trees,and graph adjacency representations. Covers sorting, searching, dynamic storage handling, and fundamental graph algorithms. Asymptotic analysis of time and space complexity are taught and used throughout the course. Students are expected to implement a variety of data structures and graph algorithms.
This course comprehensively explores concepts and technical measures to enforce security policies and safeguard networks and systems against malicious activities. The curriculum delves into defence mechanisms across the data, system, network, and perimeter layers, examining how these techniques can be orchestrated to form a defence-in-depth strategy. Additionally, students will gain insights into ethical system engineering and the application of security measures such as Firewalls, IDS, IPS, proxies, and more to secure networks effectively.
This course equips participants with essential skills, methodologies, and processes for identifying cyber incidents and conducting thorough computer and network investigations while adhering to ethical guidelines and collaborative best practices. File system, memory, and network forensics are the main focus of this course.
In this course, students will be introduced to Advanced Persistent Threat (APT) groups, tactics, techniques, and procedures employed to carry out attacks. We will explore how machine learning and data mining techniques are applied to identify Malware as APT groups' key method for conducting their malicious operations.