Posts

Showing posts with the label scikitlearn

Scikit-learn

  Introduction Machine Learning concepts Module 1. The Predictive Modeling Pipeline Tabular data exploration Fitting a scikit-learn model on numerical data Handling categorical data Module 2. Selecting the best model Overfitting and Underfitting Validation and learning curves Bias versus variance trade-off Module 3. Hyperparameters tuning Manual tuning Automated tuning Module 4. Linear Models Intuitions on linear models Linear regression Modelling with a non-linear relationship data-target Regularization in linear model Linear model for classification Module 5. Decision tree models Intuitions on tree-based models Decisison tree in classification Decision tree in regression Hyperparameters of decision tree Module 6. Ensemble of models Ensemble method using bootstrapping Ensemble based on boosting Hyperparameters tuning with ensemble methods Module 7. Evaluating model performance Comparing a model with simple baselines Choice of cross-validation Nested cross-validation Classification...

Cyber Security Concepts and Machine Learning to Detect Early Threat

Image
pexel Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, malicious attacks, and other security threats. It encompasses a wide range of technologies, processes, and practices aimed at safeguarding digital assets and ensuring the confidentiality, integrity, and availability of information. 1. Digital Transformation: With the increasing digitization of business processes and services, organizations are increasingly reliant on technology to operate efficiently and serve their customers. This digital transformation has led to a proliferation of endpoints, data, and cloud-based services, expanding the attack surface for cyber threats. 2. Cyber Threat Landscape: The cyber threat landscape is constantly evolving, with threat actors ranging from individual hackers to organized cybercriminal groups, nation-states, and insider threats. These adversaries exploit vulnerabilities in software, networks, and human behavior to steal sens...