Filter by
The language used throughout the course, in both instruction and assessments.
Results for "vulnerability+(computing)"
University of Toronto
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Visualization (Computer Graphics), Artificial Intelligence, Machine Learning, Python Programming, NumPy, Linear Algebra
University of Colorado Boulder
Skills you'll gain: Project Design, Internet Of Things, Machine Learning Algorithms, Failure Analysis, Product Planning, Debugging, Embedded Systems, Data Analysis, Data Processing, Model Based Systems Engineering, IBM Cloud, File Systems, Wireless Networks, Data Storage Technologies, Cloud Platforms, Big Data, Computer Networking, Network Protocols, Technical Communication, Simulation and Simulation Software
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
Stanford University
Skills you'll gain: Data Ethics, Applied Machine Learning, Machine Learning Algorithms, Machine Learning, Artificial Neural Networks, Medical Science and Research, Health Care, Artificial Intelligence and Machine Learning (AI/ML), Reinforcement Learning, Supervised Learning, Deep Learning, Predictive Modeling, Health Care Procedure and Regulation, Data Processing, Image Analysis, Natural Language Processing
University of London
Skills you'll gain: Graphing, Computational Thinking, Arithmetic, Applied Mathematics, Mathematical Modeling, Numerical Analysis, General Mathematics, Computer Science, Computer Graphics, Systems Of Measurement, Cryptography
Johns Hopkins University
Skills you'll gain: Calculus, Applied Mathematics, Data Modeling, Estimation, Graphing, Mathematical Modeling, Data Analysis Software, Algebra, Trigonometry, Cost Estimation, Engineering Calculations, Linear Algebra, Data Analysis, Advanced Mathematics, Analysis, Derivatives, Mathematical Theory & Analysis, Geometry
Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Computer Security Incident Management, Data Security, Vulnerability Assessments, Application Security, Threat Detection, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Assessment, Security Software, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies
Skills you'll gain: Keras (Neural Network Library), Reinforcement Learning, Unsupervised Learning, Deep Learning, Tensorflow, Generative AI, Artificial Neural Networks, Artificial Intelligence, Time Series Analysis and Forecasting, Computer Vision, Natural Language Processing, Performance Tuning
DeepLearning.AI
Skills you'll gain: Image Analysis, Tensorflow, Computer Vision, JSON, Applied Machine Learning, Javascript, Artificial Neural Networks, Deep Learning, Data Processing, Real Time Data, Web Applications, Machine Learning
Skills you'll gain: File Systems, Operating Systems, OS Process Management, C (Programming Language), System Programming, Virtualization, Data Integrity, Debugging, Systems Design, Performance Tuning, Distributed Computing, Data Storage, System Software, Virtual Machines, Command-Line Interface, Computer Systems, Data Security, Computer Hardware, Scalability, Data Structures
DeepLearning.AI
Skills you'll gain: Disaster Recovery, Jupyter, Data Analysis, Exploratory Data Analysis, Data Ethics, Image Analysis, Emergency Response, Artificial Intelligence, Machine Learning, Predictive Modeling, Applied Machine Learning, Mitigation, Text Mining, Environmental Monitoring, Natural Language Processing, Information Privacy, Artificial Neural Networks, Deep Learning, Data Processing, Computer Vision
Dartmouth College
Skills you'll gain: Command-Line Interface, C (Programming Language), Linux Commands, Embedded Systems, Programming Principles, Computer Engineering, Embedded Software, Linux, File Systems, Engineering Software, Build Tools, Data Structures, Unix, Program Development, Algorithms, Operating Systems, System Programming, Computer Programming, Software Installation, Software Documentation
In summary, here are 10 of our most popular vulnerability+(computing) courses
- Visual Perception for Self-Driving Cars:Â University of Toronto
- Developing Industrial Internet of Things:Â University of Colorado Boulder
- Cyber Security Technologies:Â Illinois Tech
- Fundamentals of Machine Learning for Healthcare:Â Stanford University
- Mathematics for Computer Science:Â University of London
- Differential Calculus through Data and Modeling:Â Johns Hopkins University
- Identifying and Managing Security Gaps for Remote Teams:Â LearnQuest
- Deep Learning with Keras and Tensorflow:Â IBM
- Browser-based Models with TensorFlow.js:Â DeepLearning.AI
- Introduction to Operating Systems:Â Codio