Course logo

Data Science for Security and Fraud

This 4-week course provides an introduction to tackling digital security and fraud challenges using Python and data science. This course covers common cybersecurity issues with bots and human fraudsters alike, and introduces data science frameworks for identifying and addressing these issues. You will get hands-on experience playing the fraudster yourself, then you will build solutions to identify malicious behavior and will design ways to stop it. The data sources and data science methods covered in this course can help data scientists develop new skills in digital security and fraud detection.

Instructor profile photo
Yiing Chau Mak
Head of Data at MetaMap

We taught over 5000 learners from these companies:

Affiliation logo
Real-world projects that teach you industry skills.
Learn alongside a small group of your professional peers
Part-time program with 2 live events per week.
Get notified when the course opens:

Course taught by expert instructors

Instructor Photo
Affiliation logo

Yiing Chau Mak

Head of Data at MetaMap

Mak is currently Head of Data at MetaMap. Previously, he led data science at Shape Security, where he helped Fortune 500 companies detect and stop malicious traffic – by bad bots, bad humans, and everything in between. As Director of Data Science at F5 (which acquired Shape), he built a real-time machine learning-based system that tackled many digital security and fraud challenges, such as fake account creation, account takeover, and unemployment claims. In his past life, Mak worked at the intersection of cybersecurity, cybercrime and personal data protection at the Cyber Security Agency of Singapore, where he led the creation of Singapore’s cybersecurity legislation and strategy.

A course you'll actually complete. AI-powered learning that drives results.

AI-powered learning

Transform your learning programs with personalized learning. Real-time feedback, hints at just the right moment, and the support for learners when they need it, driving 15x engagement.

Live courses by leading experts

Our instructors are renowned experts in AI, data, engineering, product, and business. Deep dive through always-current live sessions and round-the-clock support.

Practice on the cutting edge

Accelerate your learning with projects that mirror the work done at industry-leading tech companies. Put your skills to the test and start applying them today.

Flexible schedule for busy professionals

We know you’re busy, so we made it flexible. Attend live events or review the materials at your own pace. Our course team and global community will support you every step of the way.


Completion certificates

Each course comes with a certificate for learners to add to their resume.

Best-in-class outcomes

15-20x engagement compared to async courses

Support & accountability

You are never alone, we provide support throughout the course.

The course

Learn and apply skills with real-world projects.

Who is it for?
  • Data scientists and analysts who are curious about the security and fraud space, or who need to defend their organizations and products from online fraud and abuse

  • Cybersecurity practitioners and fraud/abuse/trust and safety analysts who want to tackle online security and fraud problems at scale

    • Ability to write Python fluently, and manipulate data within Python.
    • Basic understanding of statistics and probability.
    • Data science and fraud/security experience are not required.
  • How web applications work and how web content is delivered over the Internet
  • How to inspect websites and web/API traffic
  • How to think about web-application security: core security paradigms, what “identity” really means online, how attackers evolve over time, and some thoughts on rule-based vs. AI/ML security systems
  • How to think like an attacker: common vulnerabilities and process/security loopholes in web applications, how to probe for those vulnerabilities, and top techniques employed by attackers (it’s not all about technology)
For this project, you will be the bad actor! You will examine a real (live) web application, then will build and deploy a script/system that attempts to take over accounts on the application. Your actual goal is trying to steal from a bank as much money as possible!
  • How to analyze web-application data
  • What qualifies as “useful” data for security and fraud, where to obtain such data, and how to process and analyze it
  • All about bots: how they work, how they manifest in web traffic, and why they are necessary to commit fraud at scale
  • How to engineer useful features for bot detection with concepts like traffic entropy, and use readily available log data to develop such features
You will analyze logs from the web server/application you "attacked" last week, and will use anomaly-detection techniques to identify and profile any suspected automated (bot) logins to the web application.
  • What kinds of signals are available via the browser
  • How humans and bots interact with websites and how to differentiate the two
  • How good (legitimate human) users and human fraudsters interact with websites and how to differentiate the two
You will develop a model to classify transactions as “legitimate human”, “fraudster”, or “bot”, with features derived from user-interaction data like mouse movements and keystrokes. You will get to work with clean, high-quality, labeled data!
  • Graphs 101: why we use graphs, how they work, and other key concepts
  • How graphs can be applied to solve security and fraud challenges: possible frameworks and key considerations
  • How to set up your own graph (using TigerGraph as an example), ingest data, and start analyzing
You will set up your own graph and will ingest some real transaction data into the graph to identify potentially fraudulent transactions that are related to a number of "seed" fraud indicators.

Still not sure?

Get in touch and we'll help you decide.

Course success stories

Learn together and share experiences with other industry professionals

Amazing class! I was especially drawn in by the projects. I loved balance of scaffolding to independence—we had an almost endless ability to explore different possibilities, whether it was poking around for vulnerabilities on a practice website or sifting through huge datasets to look for patterns that might signal fraud. This class made me excited about what you can do with data science!

Anna MisteleCS Major, Stanford University

Mak is the real deal. In a space that's flooded with hype and FUD, Mak brings actionable knowledge to the table by focusing his curriculum on the highest impact practical problems in security and risk. The diversity of his professional experience means that you will not only get top-tier technical instruction on the applying data science to fraud problems, but will also get a rare opportunity to combine this with attacker economics and philosophy. This is not a course to miss.

Clarence ChioCofounder & CTO, Unit21

I thought the material was relevant, well structured and presented, and the assignments were thoughtful and thought provoking.

Krishna VenkatramanChief Data Officer, Kueski

Frequently Asked Questions