Filter by
The language used throughout the course, in both instruction and assessments.
Results for "adversarial+attack+implementation"
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
University of Alberta
Skills you'll gain: Reinforcement Learning, Artificial Intelligence and Machine Learning (AI/ML), Systems Development, Solution Architecture, Simulations, Performance Testing, Artificial Neural Networks, Applied Machine Learning, Machine Learning Algorithms, Markov Model, Algorithms, Technical Writing
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Cyber Threat Hunting, Penetration Testing, Anomaly Detection, Scripting, Command-Line Interface, Python Programming, Data Access, System Monitoring, User Accounts, Scripting Languages, System Programming, Automation
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
Skills you'll gain: Secure Coding, Data Ethics, Vulnerability Assessments, Security Testing, Security Strategy, Security Engineering, Threat Modeling, Data Security, Penetration Testing, Security Controls, Artificial Intelligence, Cybersecurity, Threat Management, Encryption, Authorization (Computing)
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Threat Modeling, Email Security, Security Engineering, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Coursera Project Network
Skills you'll gain: Generative AI, Keras (Neural Network Library), Tensorflow, Deep Learning, Dimensionality Reduction, Exploratory Data Analysis, Applied Machine Learning, Anomaly Detection, Data Processing, Data Visualization, Data Synthesis, Machine Learning
Microsoft
Skills you'll gain: Microsoft Azure, Application Security, Cloud Security, Infrastructure Security, Kubernetes, Network Security, Security Engineering, Firewall, Endpoint Security, Identity and Access Management, Infrastructure As A Service (IaaS), Role-Based Access Control (RBAC), Cloud Services, Virtual Machines, Containerization, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Private Networks (VPN), Encryption
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Cybersecurity, Dependency Analysis, Docker (Software), Git (Version Control System)
University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Infrastructure, Data Integrity
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, System Configuration
In summary, here are 10 of our most popular adversarial+attack+implementation courses
- Cyber Threats and Attack Vectors: University of Colorado System
- A Complete Reinforcement Learning System (Capstone): University of Alberta
- Advanced Python Scripting for Cybersecurity: Infosec
- Microsoft Azure Cybersecurity Tools and Solutions: Microsoft
- Security for Artificial Intelligence Software and Services: Board Infinity
- Design and Analyze Secure Networked Systems: University of Colorado System
- AI for Cybersecurity: Johns Hopkins University
- Data Balancing with Gen AI: Credit Card Fraud Detection: Coursera Project Network
- Implement Platform Protection: Microsoft
- Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis