Filter by
The language used throughout the course, in both instruction and assessments.
Results for "adversarial+attack+implementation"
Skills you'll gain: Generative AI, Auditing, Compliance Auditing, Risk Analysis, Risk Management, Business Risk Management, Artificial Intelligence, Risk Mitigation, Data Ethics, Artificial Intelligence and Machine Learning (AI/ML)
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Artificial Intelligence, Supervised Learning, Microsoft Windows
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Encryption, Application Security, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Web Applications, SQL
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cryptography, Security Testing, Cybersecurity, Vulnerability Assessments, Encryption, Technical Writing, Cyber Threat Intelligence, Cyber Attacks
Vanderbilt University
Skills you'll gain: Crisis Management, Incident Response, ChatGPT, Computer Security Incident Management, Cross-Functional Collaboration, Threat Modeling, Cybersecurity, Scenario Testing, Hardening, Complex Problem Solving, Discussion Facilitation, Artificial Intelligence, Decision Making, Performance Analysis, Developing Training Materials
Microsoft
Skills you'll gain: Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Microsoft Azure, Security Controls, Security Strategy, Incident Response, Threat Detection, Generative AI, Artificial Intelligence, Automation, Natural Language Processing
University of Colorado Boulder
Skills you'll gain: Generative AI, ChatGPT, Image Analysis, Artificial Neural Networks, Natural Language Processing, Deep Learning, Artificial Intelligence, Computer Vision, Machine Learning, Probability & Statistics
Skills you'll gain: Matplotlib, Deep Learning, Linear Algebra, Artificial Neural Networks, NumPy, Image Analysis, Keras (Neural Network Library), Data Visualization Software, Machine Learning Algorithms, Seaborn, Pandas (Python Package), Tensorflow, Machine Learning, Applied Machine Learning, Computer Vision, Supervised Learning, Artificial Intelligence and Machine Learning (AI/ML), Data Analysis, PyTorch (Machine Learning Library), Python Programming
Skills you'll gain: Penetration Testing, Scripting, Scripting Languages, Python Programming, Cyber Security Assessment, Cyber Operations, Computer Programming, Email Security, Cybersecurity, Malware Protection, Command-Line Interface, Program Development, TCP/IP
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
In summary, here are 10 of our most popular adversarial+attack+implementation courses
- Auditing Generative AI: Strategy, Analysis & Risk Mitigation: ISACA
- Cyber Attack Countermeasures: New York University
- Advanced Malware and Network Anomaly Detection: Johns Hopkins University
- Identifying Security Vulnerabilities: University of California, Davis
- Cybersecurity Fundamentals: Johns Hopkins University
- ChatGPT + Cybersecurity: AI-Powered Tabletops & Training: Vanderbilt University
- Microsoft Copilot for Security: Microsoft
- Introduction to Generative AI: University of Colorado Boulder
- Deep Learning with Real-World Projects: Packt
- Advanced Exploitation and Scripting Techniques: Packt