Filter by
The language used throughout the course, in both instruction and assessments.
Results for "adversarial+attack+implementation"
Skills you'll gain: Azure Active Directory, Single Sign-On (SSO), Identity and Access Management, Authentications, Authorization (Computing), Active Directory, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Security Controls, Cloud Services
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Cybersecurity, Dependency Analysis, Docker (Software), Git (Version Control System)
Skills you'll gain: MLOps (Machine Learning Operations), AWS SageMaker, Amazon Web Services, Scalability, Machine Learning, Technical Design, Amazon Elastic Compute Cloud, Cloud Computing, AWS Identity and Access Management (IAM), Cloud Security, Disaster Recovery, Data Security
Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Vulnerability Management, Secure Coding, Encryption, Cybersecurity, Infrastructure Security, Computer Security, Threat Modeling, Public Key Infrastructure, Data Security, Authentications, Data Integrity
LearnQuest
Skills you'll gain: Continuous Monitoring, Cloud Security, Disaster Recovery, Network Security, Cloud Services, Security Strategy, Security Controls, Cloud Computing Architecture, Cloud Computing, Hybrid Cloud Computing, Infrastructure Security, Cybersecurity, Data Security, Security Management, Threat Detection, Identity and Access Management
LearnQuest
Skills you'll gain: Blockchain, Key Management, Cryptography, Application Security, Cryptographic Protocols, Encryption, Security Engineering, Secure Coding, Data Security, Threat Modeling, Public Key Cryptography Standards (PKCS), Security Testing, Cybersecurity, Solution Design, Authentications, Vulnerability Assessments, Solution Architecture, Code Review, Authorization (Computing)
Coursera Project Network
Skills you'll gain: Generative AI, Keras (Neural Network Library), Tensorflow, Deep Learning, Dimensionality Reduction, Exploratory Data Analysis, Applied Machine Learning, Anomaly Detection, Data Processing, Data Visualization, Data Synthesis, Machine Learning
- Status: Free
Starweaver
Skills you'll gain: Threat Management, Vulnerability Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Vulnerability Scanning, Cyber Attacks, Patch Management
Johns Hopkins University
Skills you'll gain: Email Security, Malware Protection, Mobile Security, Cybersecurity, Network Security, Internet Of Things, Open Web Application Security Project (OWASP), Network Monitoring, Security Controls, TCP/IP, Threat Detection, Network Analysis, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Border Gateway Protocol, Infrastructure Security, Application Security, Information Systems Security, Threat Modeling, Network Routing
- Status: Free
DeepLearning.AI
Skills you'll gain: Artificial Neural Networks, Deep Learning, Semantic Web, Artificial Intelligence and Machine Learning (AI/ML), Natural Language Processing, Artificial Intelligence, Machine Learning
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Mobile Security, Cybersecurity, Cyber Threat Intelligence, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Intrusion Detection and Prevention, Encryption, Network Protocols
SkillUp EdTech
Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity, Cryptography, Disaster Recovery, Digital Assets, Vulnerability Assessments, Enterprise Security, Data Security, Law, Regulation, and Compliance, Application Frameworks, Cybersecurity, Information Systems Security, Network Security, Emerging Technologies, Distributed Computing, Transaction Processing
In summary, here are 10 of our most popular adversarial+attack+implementation courses
- Cybersecurity Identity and Access Solutions with Azure AD: Microsoft
- Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
- Machine Learning Implementation and Operations in AWS: Whizlabs
- Security Architecture and Engineering: Packt
- Securing Cloud and Hybrid Networks: LearnQuest
- Blockchain Security Advanced Protection : LearnQuest
- Data Balancing with Gen AI: Credit Card Fraud Detection: Coursera Project Network
- Deception As a Defense: Starweaver
- Information Assurance Analysis: Johns Hopkins University
- Embedding Models: From Architecture to Implementation: DeepLearning.AI