<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>training uk | Net Security Training</title>
	<atom:link href="https://www.net-security-training.co.uk/tag/training-uk/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.net-security-training.co.uk</link>
	<description>Shaping the skills of Cyber Professionals</description>
	<lastBuildDate>Sat, 24 Aug 2019 17:04:02 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.net-security-training.co.uk/wp-content/uploads/2019/11/cropped-fav-32x32.png</url>
	<title>training uk | Net Security Training</title>
	<link>https://www.net-security-training.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>3 Benefits of a Public Key Infrastructure (PKI)</title>
		<link>https://www.net-security-training.co.uk/3-benefits-public-key-infrastructure-pki/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Wed, 21 Feb 2018 11:37:39 +0000</pubDate>
				<category><![CDATA[PKI]]></category>
		<category><![CDATA[online courses]]></category>
		<category><![CDATA[online training]]></category>
		<category><![CDATA[pki course]]></category>
		<category><![CDATA[pki course UK]]></category>
		<category><![CDATA[Pki training]]></category>
		<category><![CDATA[Pki training UK]]></category>
		<category><![CDATA[public key infrastructure course]]></category>
		<category><![CDATA[public key infrastructure course UK]]></category>
		<category><![CDATA[public key infrastructure training]]></category>
		<category><![CDATA[public key infrastructure training UK]]></category>
		<category><![CDATA[training courses]]></category>
		<category><![CDATA[training uk]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=9224</guid>

					<description><![CDATA[A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store &#38; revoke digital certificates and manage public&#8211;key encryption. Secure access control. With a unique verifiable identity, you can determine what level of access to grant to that device. In addition, you can now deny access to anyone who does not [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>				A <b>public key infrastructure</b> (<b>PKI</b>) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store &amp; revoke digital certificates and manage <b>public</b>&#8211;<b>key</b> encryption.</p>
<ol>
<li><strong>Secure access control. </strong>With a unique verifiable identity, you can determine what level of access to grant to that device. In addition, you can now deny access to anyone who does not have a proper certificate – <em>no cert, no way</em>. In addition, if you find out a certificate has been somehow compromised because it is unique and identifiable, you can revoke its access privileges and that certificate will no longer be granted access.</li>
<li><strong>Mutual Authentication. </strong>In the days before IoT and autonomous networked devices, the device didn’t need to be authenticated, just the servers. You wanted to make sure that the website you were logging into was actually a bank and not some bogus phishing site. The bank authenticated your identity through your login and password. With IoT, the device needs to be authenticated and the device also needs to authenticate the server it is talking to. With digital certificates and secure elements, this is now practical.</li>
<li><strong>Secure Over-the-Air (OTA) Update. </strong>The problem with many devices today is that they will accept software updates from anyone. Remember, you want a device to only accept software that is verified and comes from a trusted server. The certificates allow the device to prove it should receive an update and which one, and the cryptography in the secure element allows the device to verify the server as well as the signed code.</li>
</ol>
<p>As you can see, combined with digital certificates, PKI enables a trusted environment for robust identity protection by <em>authenticating</em> the identity of a device and assuring the<em> integrity</em> of that device.</p>
<p>Reference: https://www.kyrio.com/blog/3-benefits-public-key-infrastructure-pki/		</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Govt plans to use Artificial Intelligence tools for digital forensics</title>
		<link>https://www.net-security-training.co.uk/artificial-intelligence-digital-forensics/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Fri, 16 Feb 2018 10:43:02 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Applications of Artificial Intelligence]]></category>
		<category><![CDATA[training and courses]]></category>
		<category><![CDATA[training uk]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=9032</guid>

					<description><![CDATA[Govt plans to use AI tools for digital forensics. The government is planning to use artificial intelligence-based tools for a digital forensics project currently underway at the Centre for Development of Advanced Computing (C-DAC), said a report in The Economic Times. The report said that the C-DAC is planning to use artificial intelligence to look [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="article-content">
<p class="article-title">Govt plans to use AI tools for digital forensics. The government is planning to use artificial intelligence-based tools for a digital forensics project currently underway at the Centre for Development of Advanced Computing (C-DAC), said a report in The Economic Times.</p>
<p>The report said that the C-DAC is planning to use artificial intelligence to look out for threats before they breach systems and track hackers to stop repeated breaches. The digital forensics arm of the C-DAC will help small and medium firms roll out commercial solutions for cyber threats, it added.</p>
<p>Finance minister Arun Jaitley had, in last year’s budget speech, said that the C-DAC, in collaboration with Indian Computer Emergency Response Team (CERT-In), would look to develop tools to tackle cybersecurity issues. He had also said that CERTs for different sectors, especially the financial sector, were being contemplated.</p>
<p>After Jaitley&#8217;s speech, Union minister for electronics and information technology Ravi Shankar Prasad had said that the C-DAC was working on digital forensics, a branch of forensic science that deals with recovering and analysing information from data storage devices including computers, phones and networks.</p>
<p>The report said that the digital forensics project has a budget of Rs 3.95 crore and that, apart from the C-DAC, the Indian Institute of Technology, Patna will also be involved in its implementation.</p>
<p>The report cited a senior government official as saying that the project will help the C-DAC research on cybersecurity for two years before starting out training programmes for government officials in the field.</p>
<p>The Indian government has taken a number of initiatives in recent years to boost cybersecurity.</p>
<p>Last month, the government said its botnet malware apps had reduced infections in the country by at least 51% after their launch on the web and the Google Play Store in February 2017.</p>
<p>The government had launched the Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre) under CERT-In in February last year. The government had also launched apps such as AppSamvid, USB Pratirodh and M-Kavach on Google Play Store and on the web to help detect and remove botnet malware, in the same period.</p>
<p>Reference: http://techcircle.vccircle.com/2018/02/15/govt-plans-to-use-ai-tools-for-digital-forensics-report</p>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Google DeepMind: AI becomes more alien</title>
		<link>https://www.net-security-training.co.uk/google-deepmind-ai-becomes-alien/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Thu, 19 Oct 2017 15:26:05 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Applications of Artificial Intelligence]]></category>
		<category><![CDATA[training and courses]]></category>
		<category><![CDATA[training uk]]></category>
		<guid isPermaLink="false">http://www.net-security-training.co.uk/?p=5343</guid>

					<description><![CDATA[There are many more possible moves in a Go game than a chess match Google&#8217;s DeepMind says it has made another big advance in artificial intelligence by getting a machine to master the Chinese game of Go without help from human players. The AlphaGo program, devised by the tech giant&#8217;s AI division, has already beaten [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-full wp-image-5344" src="https://www.net-security-training.co.uk/wp-content/uploads/2017/10/google-article-19-10-17.jpg" alt="" width="660" height="371" /></p>
<p>There are many more possible moves in a Go game than a chess match</p>
<p>Google&#8217;s DeepMind says it has made another big advance in artificial intelligence by getting a machine to master the Chinese game of Go without help from human players.</p>
<p>The AlphaGo program, devised by the tech giant&#8217;s AI division, has already beaten two of the world&#8217;s best players.</p>
<p>It had started by learning from thousands of games played by humans.</p>
<p>But the new AlphaGo Zero began with a blank Go board and no data apart from the rules, and then played itself.</p>
<p>Within 72 hours it was good enough to beat the original program by 100 games to zero.</p>
<p>DeepMind&#8217;s chief executive, Demis Hassabis, said the system could now have more general applications in scientific research.</p>
<p>&#8220;We&#8217;re quite excited because we think this is now good enough to make some real progress on some real problems even though we&#8217;re obviously a long way from full AI,&#8221; he told the BBC and other journalists.</p>
<p>The London-based artificial intelligence company&#8217;s software defeated leading South Korean Go player Lee Se-dol by four games to one last year.</p>
<p>In a game where there are more possible legal board positions than there are atoms in the universe, it was a triumph for machine over man and one that came much earlier than many in the AI world had expected.</p>
<p>AlphaGo followed this with the defeat of the world&#8217;s number one Go player, China&#8217;s Ke Jie, in May.</p>
<p>As with many advances in this field, the achievements required the combination of vast amounts of data &#8211; in this case records of thousands of games &#8211; and a lot of computer-processing power.</p>
<p>David Silver, who led that effort, says the team took a very different approach with AlphaGo Zero.</p>
<p>&#8220;The new version starts from a neural network that knows nothing at all about the game of Go,&#8221; he explained.</p>
<p>&#8220;The only knowledge it has is the rules of the game. Apart from that, it figures everything out just by playing games against itself.&#8221;</p>
<p><strong>What is Go?</strong></p>
<p>Go is thought to date back to ancient China, several thousand years ago.</p>
<p>Using black and white stones on a grid, players gain the upper hand by surrounding their opponents&#8217; pieces with their own.</p>
<p>The rules are simpler than those of chess, but a player typically has a choice of 200 moves at most points in the game, compared with about 20 in chess.</p>
<p>It can be very difficult to determine who is winning, and many of the top human players rely on instinct.</p>
<p>This has turned out to be far more efficient way of addressing the problem.</p>
<p>Whereas AlphaGo took months to get to the point where it could take on a professional, AlphaGo Zero got there in just three days, using a fraction of the processing power.</p>
<p>&#8220;It shows it&#8217;s the novel algorithms that count, not the compute power or the data,&#8221; says Mr Silver.</p>
<p>He enthuses about an idea some may find rather scary &#8211; that in just a few days a machine has surpassed the knowledge of this game acquired by humanity over thousands of years.</p>
<p>&#8220;We&#8217;ve actually removed the constraints of human knowledge and it&#8217;s able, therefore, to create knowledge itself from first principles, from a blank slate,&#8221; he said.</p>
<p>Image copyright Moxie Pictures Image caption Google DeepMind&#8217;s defeat of champion Go player Lee Se-dol has been made into a documentary</p>
<p>Whereas earlier versions quickly learned from and improved upon human strategies, AlphaGo Zero developed techniques which the professional player who advised DeepMind said he had never seen before.</p>
<p>Many of the team have now moved on to new projects where they are trying to take this technique to new areas. Demis Hassabis mentions drug design and the discovery of new materials as areas of interest.</p>
<p>Whereas some see a threat from AI, he looks ahead with optimism.</p>
<p>&#8220;I hope these kind of algorithms will be routinely working with us as scientific experts medical experts on advancing the frontiers of science and medicine &#8211; that&#8217;s what I hope,&#8221; he says.</p>
<p>But he and his colleagues are cautious about how rapidly we will see the wider application of these AI techniques &#8211; a game with clear rules and no element of luck is one thing, the messy, random, unpredictable real world quite another.</p>
<p>We need to keep a close eye on the ethical dilemmas involved in developing a machine that, by some definitions, can think for itself &#8211; especially when it is controlled by a giant like Google.</p>
<p>But for now, there are few signs that AlphaGo Zero and its ilk will either steal our jobs or threaten to make humanity obsolete.</p>
<p>Reference: BBC news</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
