Seven video seminars Topic 1: Webinar - Artificial Intelligence and Machine Learning in Unity Introduction The discussion was based on three topics which are AI Planner, ML-Agents and Barracuda. All...

1 answer below »

https://cdnapisec.kaltura.com/index.php/extwidget/preview/partner_id/2246991/uiconf_id/43291562/entry_id/1_zytdohg7/embed/dynamic




https://youtu.be/g1oVZbbvKy0












https://youtu.be/GafHfe12reE




https://thedisruptionofwork.splashthat.com/




https://content.carbonblack.com/c/gioy1dctkh1rjxmskcfp?x=PEXOF9&mkt_tok=NzU2LURBVi0zMDcAAAF7fdN7Vns5VJn_B95Z3SmSDMQQVLMGGC1bSH3sZoMHJ59M_DuhzZ-DMlZJz24GOAVNIBfzEbbBrA6Tthe0RFMgmDxzbt7-xReEootr0i6Vhqly




https://youtu.be/Zunq-bqogYs




https://youtu.be/VhQODzQ3cq4
















Seven video seminars Topic 1: Webinar - Artificial Intelligence and Machine Learning in Unity Introduction The discussion was based on three topics which are AI Planner, ML-Agents and Barracuda. All these topics have been presented through webinar which will be hosted by Marek Marchelwicz on YouTube. AI planner is used to determine AI behaviour by using cleaning robots. Next it will be ML or Machine learning agents which is an open source project implemented by Unity. Through Barracuda the presented tries to procedure to make models in the machine learning Unity. This is done only through a package known as Barracuda. Through these Artificial Intelligence and Machine Learning tools we are able to make various images, pictures as per our desires. These topics are diverse and are of great significant in the AI and ML process. The session of the webinar is of one hour twenty minutes where the presenter explained all the things in details. SFIA Skills Related to engagement activity This AI activity is interrelated to various factors of the SFIA skills related framework, like virtual Chatbot, autonomous flying, sports analytics and activities; security and surveillances. Along with this the AI skills can be used in the field of agriculture and farming, retail, shopping and fashion technology, production and manufacturing, self driven cars and automated vehicles, healthcare and medical imagining evaluation and in warehouse, logistics and supply chain management. Methods and Tools: Level 7 – we observed that the AI narrow intelligence is used for performing narrow tasks like recognition of the human speech and convert it into machine level language using natural and personalized ways. Examples are Google Assistant, Cortana or Alexa. We also observed that AI general intelligence illustrates the universal cognitive abilities of the human beings like intensive calculations and processing the data at incredible speed. AlphaGo is a computer program for playing board game GO. As per our observation AI super intelligence is a feature which surpasses human intelligence and is a thing of the future. It will be used for decision making, creating emotional relationship and making arts and diagrams. Project Management: Level 7 – We discussed with the AI project management team it was discovered that the AI activities are implemented on a large scale. Hence I would classify AI being related to level 7 of SFIA skills. This activity linked to Machine Learning are related to various factors of the SFIA skills framework which are used in the fields of forecasting, web related services, online tutorials and Automated machine learning. Methods and Tools: Level 6: we observed that the methodologies and tools used at this level in ML are used for identification like trend analysis and auto tagging. We observed that it is used in multiple classifications and making them connected with each other; used for activities like ranking and prioritization. Project management: Level 7: We further observed that Recommendation and Prediction are the two other level of ML which is used in the field of weather prediction and assisting the farmers during agriculture through satellite images. Thus after observing these projects implemented by the ML teams it was decided by me that they are handling small sized project restricted to specific regions and hence they are classified as being within Level 7 of SFIA skills. This activity is linked to Barracuda are related to various factors of the SFIA skills framework which are used in the fields of security, networking, cloud services and storage of network based applications. Method and Tools: Level 5 – Barracuda launched the spam and virus firewall which was found to be used by large enterprises and Internet Service Providers. Project Management: Level 5: we also had an opportunity to discuss with the project management team of Barracuda and found that their project are of medium sized and hence I classified this as being related to Level 5 within SFIA Connection to Webinar - Artificial Intelligence and Machine Learning in Unity CBoK Knowledge This activity covered various aspects of the CBoK. We discussed with the project leads responsible for the management of projects related to AI, ML and Barracuda. We found that these managers have years of experience in the automation industry. We also observed and based on this evaluated that the employees working on AI, ML and Barracuda are based on their skills and efficiency acquired over a period of time in automation, security management, trend analysis and classification like that of AI in making playing game board ‘Go’, it can be stated that most of the employees had AQF level 7 training. Reflection All these models act as a package which helps in the creating games and three dimensional robots. Through this the developers are able to alter and implement the AI and ML agents as per their requirements. Barracuda is a tool which helps the Machine learning (ML) to work effectively without any errors. Thus the tools used for ML helps in creating agents which assists to generate and execute plans. The presenter Marek Marchelwicz was able to show the basic process of the three tools effectively through this webinar. Therefore, this enabled us to know and understand what machine learning and Artificial intelligence is all about. Evidence of Attendance Topic 2: Webinar: Cyber Security - Is a secure future possible? Introduction This is a webinar on cyber security which is presented by John Williams. This was a webinar which was participated by 200 attendees from different locations in Australia and globally. The webinar was conducted in the most synchronised manned by delivering due respect to all the custodians and owner of the land from where the webinar was held; the elders, the aboriginal and Torres islander people of the country and the entire community. The main purpose of this webinar is to discuss on the importance of cyber security and its future developmental plans. As per a research conducted by side desert security ventures, the global cyber crime costs is expected to grow to more than 15% over the next five years which will make the costs to $10.5 trillion by 2025 from $3 trillion in 2015. Also, by 2026 there is expectation that there will be more than 18000 cyber security professionals. There will be number of cyber security course which will be delivered in Australian Universities like cyber defense, cyber criminology and criminology cryptography. There are number of participants who are found to have delivered their viewpoint on the future of cyber security. The same will be discussed and analysed in details. SFIA Skills Related to engagement activity This activity is related to several aspects of SFIA skills framework which is specific to the government agencies and private organizations facing issues related to hacking and cyber threats. Methods and Tools: Level 9: As we observed that the methodologies required acquiring the skills requires a master degree. The graduates’ who will learn of the various cyber security threats and management, needs to have foundational, cognitive, technical and good communication skills. They also need to undertake routine activities and identify as well as report on simple issues and problems for becoming experts. Further, we also discussed on the various cyber security tools used to protect the organizational system from cyber threats. These tools are firewalls, public key infrastructure, outsourced cyber security services through MDR or managed detection and response; antivirus software, penetration testing and highly sophisticated training to the employees of the organizations. Project Management: Level – 9: we had an opportunity to discuss this issue with the project management team during the webinar where we found that the cyber security threats are an important issue and a matter of concern especially for the government organization which consists of huge database of people. Hence, management and securing these is a matter of concern and requires huge skills and efficiency. The projects that are being management by the team are mostly government and large private sectors and hence I would classify this as relating to level 9 within SFIA skills. Penetration Testers: Level 8 – we observed that the employees are generally ethical hackers who are responsible for testing the networks, system and the applications and look for the vulnerabilities which can restrict the malicious attacks. Connection to Webinar: Cyber Security - Is a secure future possible? CBoK Knowledge The Cybersecurity activities covered varied aspects of CBoK knowledge. We had a discussion with the project team and their leads responsible for managing various aspects of the cyber security projects. These projects were mostly in government organizations and large private companies where there are threats of the information being hacked, malware or ransomware. The project managers were chief security office and chief information security officer who are responsible for implementation of the security physically throughout the organization and monitoring of the IT security of all the departments of the organization. We also discovered that the employees’ works in a range of specific areas like penetration testers, security architects, security engineers and analysts who are mainly responsible for identification, controlling, planning, analysing, quality control of the organizational system and most of these employees had already cleared AQF level 8 & 9 training. Reflection The above discussion was really a fantastic topic where the discussion was to protect the public health system and data during the covid-19 pandemic situation from the hackers. The presentation was focused on hackers, but the main spotlight will be on vulnerabilities which are the first place of the problem. Also, the software installed to protect the hacking and its accountability if hacking occurs needs to be reviewed by the project teams. The ultimate aim of the cyber security by the project team will be to protect against any kind of unauthorised exploration by hackers in the organizational system and in their networks. This is because if the cyber hackers are able to penetrate the organizational system then it can have devastating impacts resulting in damage, unauthorised access of data and customer records which can be of financial nature i.e. bank information, passwords, balance etc. Therefore, it is essential to develop updated Cybersecurity tools and advanced methodologies which can help to detect as well as protect from cyber threats. Evidence of Attendance Topic 3: ICSL MRE 2021 Cybersecurity Webinar & ICSL Malware and Reverse Engineering Webinar -Threat Intelligence Introduction In this webinar we will try to discuss on the MRE 2021 Cybersecurity topics which uses analytical techniques in order to fight cybercrime and for internet security. Through this discussion we will try to evaluate various topics like threat intelligence, banking malware and ransomware, fraud detection, blockchain, IoT security, privacy and text mining, Phishing attack analysis and prevention, cyber capability analysis and forensics. We will also learn about reverse engineering (MRE) which bridges between industries, law enforcement and academia with a strong emphasize on malware related results. The various types of malwares that are threat to intelligence are banking malware, RATs, ransomware. On the other hand we will also discuss on the ICSL malware and reverse engineering agenda which is called threat intelligence. Through this we will try to learn on what are YaraNG; the various issues in this process and
Answered 1 days AfterJun 15, 2021

Answer To: Seven video seminars Topic 1: Webinar - Artificial Intelligence and Machine Learning in Unity...

Swati answered on Jun 17 2021
154 Votes
EIGHT VIDEO SEMINARS
Topic 1: Webinar - Artificial Intelligence and Machine Learning in Unity
Introduction
Three core topics picked in this discussion includes Machine Language agents, Artificial Intelligence Planner and the Barracuda. A webinar on YouTube was presented by Marek Marchelwicz was used to present these issues. For overall determination of AI behaviour by the use of cleaning robots was done with the help of AI planner. Further the ML agents that are an open source project underwent implementation by Unity. Moving ahead, the presenter tried to depict the procedure by the Barracuda for making models in ML unity. For doing this a package known as Barracuda was used. These Machine Language and Artificial Intelligence tools could help towards making several pictures and images as per the requirements. There is diversity in all these topics and they do hold much significance in ML and AI processes. Webinar session was for 1 hour 20 minutes where all these concepts were elaborated in detail by the presenter.
SFIA Skills Related to engagement activity
Various SFIA skills are associated with the Artificial Intelligence activity in this webinar based on framework related factors such as use of sports analytics, virtual chatbot, sports activities and autonomous flying along
with surveillances and security. Furthermore, the Artificial Intelligence skills may be used in retail, agriculture, farming, fashion and shopping technology, manufacturing and production, medical imaging evaluation, healthcare, automated vehicles as well as self driven cars and in logistics, warehouse and the supply chain management.
Tools and Methods- Level 7- In Webinar, it was observed that narrow Artificial Intelligence was used for performance of the narrow tasks such as human speech recognition followed by conversion of same into Machine Level Language with the help of personalized and natural ways. Examples of such AI technology include Alexa, Google Assistant and Cortana. As per observation, in the webinar the illustrations by the general Artificial intelligence is done towards the universal cognitive abilities of humans such as carrying out the intensive calculations as well as processing data at an incredible speed. A computer program named AlphaGo is used for playing board game Go. It was observed that AI super intelligence is feature surpassing human intelligence which is a futuristic thing. The use of same will be done for creation of emotional relationship, making decision as well as for making diagrams and arts.
Project Management: Level 7 – As discussed regarding the Artificial Intelligence management team, it was found that all the AI activities will be implemented on large scale thus this is classified as being related to level 7 of SFIA skills.
Moving ahead, the Machine Language (ML) activity are associated with several SFIA skills framework factors that are used in forecasting, online tutorials, web related services as well as Automated machine learning.
Methods and Tools: Level 6- As per observation the tools and methods used in ML are used for identification of auto tagging and trend analysis. Also, it was found to be used in a classification at multiple levels that makes them connected to each other and is used for the activities such as prioritization and ranking.
Project management: Level 7: Furthermore, it was found that prediction as well as recommendation are two varying Machine language levels used in the field of farmers assistance and prediction during agriculture via satellite images. So, after observation of these projects as implemented by the ML teams, decision was made by me that small sized projects are handled by them which are restricted to a certain specific region so they must be classified as being Level 7 of SFIA skills.
Several factors of SFIA skills framework are associated with the Barracuda activity that are used in the networking, security, storage of network based application and cloud services field.
Method and Tools: Level 5 – Launching of virus firewall as well as spam was done by Barracuda that was used by Internet service providers as well as large enterprises.
Project Management: Level 5: After grabbing the opportunity to discuss it with the project management team of Barracuda, it was observed that the size of their projects was medium and thus it could be classified as associated with Level 5 of SFIA skills.
Connection to Webinar - Artificial Intelligence and Machine Learning in Unity CBoK Knowledge
Varying aspects of CBoK are covered under this activity where after discussion with project leads responsible for project management associated with Barracuda, ML and AI, it was found that years of experience are held by these managers specifically in the automation industry.
It was also observed that employees working on these three technologies (AI, ML and Barracuda) are evaluated on the basis of efficiency and skills as they acquired over a span of time in security management, automation, trend analysis as well as classification like that of AI in making the playing game board called ‘Go’. Thus, it can be said that most of these employees has level 7 of AQF training.
Reflection
These 3 models known as AI, ML and Barracuda thus acts as a package helping in creation of 3D robots as well as games. By this, the developers can implement and alter the Artificial Intelligence and Machine Language agents as required. Further, Barracuda is a tool helping the Machine Learning to work efficiently and effectively without any errors in general. Thus, it would help in creation of agents assisting the generation and execution of plans. So, it can be said that presenter Marek Marchelwicz was able to present the basic process of these 3 tools in efficient ways with the help of this webinar. Hence, this helped us to understand and know all about the Machine learning and Artificial intelligence along with Barracuda.
Evidence of Attendance
Topic 2
Webinar: Cyber Security - Is a secure future possible?
Introduction
“Cyber Security- Is a secure future possible?” is a webinar presented by John Williams and attended by 200 participants from varying locations globally and in Australia. One of the most synchronised way was used to conduct this seminar wherein due respect was delivered to all the owner of land as well as custodians from the location of the webinar. This included the aboriginal and Torres islanders and the elders of the community and the country. Core purpose of this webinar was discussion regarding the cyber security importance along with future development plans of same. Side desert security ventures conducted a research and found that the global cyber crime costs are expected to grow to more than 15 percent over the next 5 years making the costs from $ 3 trillion in year 2015 to $10.5 trillion by year 2025. Furthermore, it is expected that by the year 2026, there would be more than 18000 cyber security professionals along with huge number of cyber security courses such as criminology cryptography, cyber defence and cyber criminology that would be delivered in Australian universities. In the webinar, many of the participants delivered and presented their own viewpoint regarding the cyber security future as well which was analysed and discussed in detail then.
SFIA Skills Related to engagement activity
Several aspects of SFIA skills framework associated with this activity are there that is specific to private organizations as well government agencies facing issues associated with the cyber threats and the hacking.
Methods and Tools: Level 9: As per observation, the tools along with methodologies that are required include acquiring skills with the help of master degree. That means the graduates learning several cyber security management and threats must have cognitive, foundational, good communication as well as technical skills. Also, they must undertake the routine activities followed by the identification and reporting on simple problems and issues so as to become experts. Moving ahead, the discussion regarding several cyber security tools was done that are used to protect the organizational system specifically from the cyber threats. Tools studies or discussed included public key infrastructure, firewalls, antivirus software, cyber security service by MDR (Managed detection and Response), penetration testing as well as highly sophisticated training to the organizational employees.
Project Management: Level 9: By having the opportunity to discuss this problem with the project management team during webinar, we were able to find that this cyber security threat is a vital issue and is a matter of concern more specifically for the government organizations consisting of huge people database. Thus, securing as well as managing these becomes more vital which requires huge efficiency and skills. Project management team mostly handled the government issues or the large private sector related issues that we could classify this under the level 9 of SFIA skills.
Penetration Testers: Level 8 – It was observed that employees are ethical hackers generally being responsible for network testing, system, applications testing along with checking for vulnerabilities that may restrict the malicious attacks.
Connection to Webinar: Cyber Security - Is a secure future possible? CBoK Knowledge
Various aspects of CBoK knowledge are covered in the cyber security activities. While having discussion with the project leads from the project team who held main responsibility for management of cyber security project aspects, it was found that most of these projects belongs to large private organizations or government organizations wherein there are threats associated with hacking of information, ransom-ware or malware related issues. Thus, the project managers acted as chief information security officer and chief security officer being responsible for implementing the security in physical manner in the organization along with monitoring the IT security of all organizational departments.
It was also discovered through webinar that works of employees are in specific area ranges such as security architects, penetration testers, security analysts and security engineers who are majorly responsible for identifying, control, plan, and analysis as well as for carrying out the quality control of organizational system wherein most of these employees had cleared the AQF level 8 and level 9 training already.
Reflection
This discussion in webinar was a great topic wherein the protection of public health system as well as data from hackers during the Covid-19 pandemic situation was discussed. Core focus of presentation was on hackers but the spotlight was grabbed by the vulnerabilities as well that are initial root cause of problem. Also, there is need for project teams to review the software installed for hacking protection along with reviewing its accountability in case hacking takes place. Major aim of cyber security by project team would be protection against any kind of illegal, unauthorized exploitation in organizational system and associated networks by the hackers. This is because in case cyber hackers can penetrate the systems of organization, they may have devastating impacts which may further result in unauthorized access as well as damage of customer records and data of financial nature such as passwords, bank information, balance and so on. Thus, it is vital to undergo development of Cyber security tools along with advanced technologies that may help in detection and protection of cyber threats.
Evidence of Attendance
Topic-3
Webinar: ICSL MRE 2021 Cyber security Webinar
Introduction
This is a webinar presented by Simarjeet Kaur and attended by participants from varying locations wherein the ICSL model was detailed out first of all stating the stakeholders, FedUni and other researchers, strategy adopted by them and research along with application of research solutions on stakeholders. ICSL tends to conduct research applying advanced analytical techniques to internet security and cybercrime. Various conferences are used to attain the value propositions such as Malware and Reverse engineering wherein the research model works on triangle analysis gap that is from yara which undergoes clustering and on identification of variant new variants are added which results back in automatic yara rule generation. This would help in identification of Malware capabilities automatically and with more experience they could know where to look, shortcuts and the common things as well as it will save cost and time along with avoiding deeper analysis. So, this webinar would basically intend to introduce CAPA for cyber security wherein CAPA do use rules written by experts for capabilities recognition and analyzes the program along with identification of things done by program. Another program that is compared is Wannacry encryptor wherein again CAPA proves to be more...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here