Filter by
The language used throughout the course, in both instruction and assessments.
Results for "adversarial+attack+mitigation"
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Threat Modeling, Email Security, Security Engineering, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Coursera Project Network
Skills you'll gain: Generative AI, Keras (Neural Network Library), Tensorflow, Deep Learning, Dimensionality Reduction, Exploratory Data Analysis, Applied Machine Learning, Anomaly Detection, Data Processing, Data Visualization, Data Synthesis, Machine Learning
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
Skills you'll gain: Secure Coding, Data Ethics, Vulnerability Assessments, Security Testing, Security Strategy, Security Engineering, Threat Modeling, Data Security, Penetration Testing, Security Controls, Artificial Intelligence, Cybersecurity, Threat Management, Encryption, Authorization (Computing)
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Data Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Cloud Computing
CertNexus
Skills you'll gain: Data Ethics, Accountability, Risk Management, Operational Risk, Risk Analysis, Information Privacy, Risk Mitigation, Personally Identifiable Information, Safety and Security, Business Ethics, Artificial Intelligence, Diversity and Inclusion
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Cybersecurity, Dependency Analysis, Docker (Software), Git (Version Control System)
Skills you'll gain: Generative AI, Data Ethics, Personally Identifiable Information, Information Privacy, General Data Protection Regulation (GDPR), Data Security, Data Governance, Data Integrity, Encryption, Artificial Intelligence
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, System Configuration
In summary, here are 10 of our most popular adversarial+attack+mitigation courses
- AI for Cybersecurity: Johns Hopkins University
- Data Balancing with Gen AI: Credit Card Fraud Detection: Coursera Project Network
- Design and Analyze Secure Networked Systems: University of Colorado System
- The GRC Approach to Managing Cybersecurity: Kennesaw State University
- Security for Artificial Intelligence Software and Services: Board Infinity
- AWS: Threat Detection, Logging and Monitoring: Whizlabs
- Detect and Mitigate Ethical Risks: CertNexus
- Hacking and Patching: University of Colorado System
- Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
- Gen AI for Data Privacy & Protection: Edureka