In previous chapters, we saw how to build anomaly detection systems from scratch by using different machine learning algorithms and Python libraries. This chapter included a step-by-step guide to help you build a fully functioning threat-hunting platform, using three amazing open source projects. We also implemented a machine learning plugin to optimize and enhance the threat-hunting platform's power. By now, you have learned how to build many defensive systems using the power of machine learning. The next chapter is a must-read if you want to learn how to bypass machine learning safeguards.





















































