Filter by
The language used throughout the course, in both instruction and assessments.
Results for "adversarial+attack+implementation"
University of Colorado System
Skills you'll gain: Cryptography, Arithmetic, Algorithms, Applied Mathematics, Probability
University of Colorado Boulder
Skills you'll gain: Generative AI, ChatGPT, Image Analysis, Artificial Neural Networks, Natural Language Processing, Deep Learning, Artificial Intelligence, Computer Vision, Machine Learning, Probability & Statistics
Skills you'll gain: Generative AI, Auditing, Compliance Auditing, Risk Analysis, Risk Management, Business Risk Management, Artificial Intelligence, Risk Mitigation, Data Ethics, Artificial Intelligence and Machine Learning (AI/ML)
LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Security Strategy, Cloud Security, Disaster Recovery, Threat Management, Firewall, Network Security, Cybersecurity, Cloud Services, Security Information and Event Management (SIEM), Network Monitoring, Security Controls, Cloud Computing Architecture, Infrastructure Security
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Encryption, Application Security, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Web Applications, SQL
Skills you'll gain: Unsupervised Learning, Generative AI, Supervised Learning, Deep Learning, Applied Machine Learning, Artificial Intelligence and Machine Learning (AI/ML), Reinforcement Learning, OpenAI, Predictive Modeling, Machine Learning Algorithms, Image Analysis, Artificial Intelligence, Artificial Neural Networks, Machine Learning, Feature Engineering, Unstructured Data, Business Logic, ChatGPT, Dimensionality Reduction, Data Modeling
- Status: Free
Infosec
Skills you'll gain: Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Data Ethics, Governance, Information Assurance, Law, Regulation, and Compliance, Information Privacy, Regulatory Compliance, Generative AI, Machine Learning, Ethical Standards And Conduct, Risk Management
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Threat Management, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Cyber Attacks, Threat Modeling, Risk Analysis, Application Security, Vulnerability Assessments, Network Security, Threat Detection, Data Security, Artificial Intelligence, Risk Mitigation, Generative AI, Natural Language Processing
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
In summary, here are 10 of our most popular adversarial+attack+implementation courses
- Mathematical Foundations for Cryptography: University of Colorado System
- Introduction to Generative AI: University of Colorado Boulder
- Auditing Generative AI: Strategy, Analysis & Risk Mitigation: ISACA
- Advanced Network Security: LearnQuest
- Identifying Security Vulnerabilities: University of California, Davis
- AI and Machine Learning Algorithms and Techniques: Microsoft
- AI Security: Infosec
- Hacking and Patching: University of Colorado System
- DDoS Attacks and Defenses: University of Colorado System
- Introduction to AI for Cybersecurity: Johns Hopkins University