Anyone with a threat-intelligence background and little to no exposure to machine learning methods and conversely, anyone with a data-science or machine learning background but no extensive knowledge of malware and threat-intelligence.
This training will aim at the intersection of both, attempting to convey practical insights to user modern machine learning technique to supercharge your intel analysis workflows.
Exposure to some ML frameworks such as SciKit, TensorFlow may come handy, but won’t be required.
Some familiarity of reverse engineering tools, disassemblers, debuggers would be helpful but not necessary either.