Filter by
The language used throughout the course, in both instruction and assessments.
Results for "adversarial+attack+mitigation"
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Cybersecurity, Virtual Private Networks (VPN), Remote Access Systems, Network Protocols, Vulnerability Assessments, Encryption, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
SkillUp EdTech
Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments
- Status: Free
Coursera Instructor Network
Skills you'll gain: Data Ethics, Generative AI, Regulatory Compliance, Security Strategy, Healthcare Industry Knowledge, Artificial Intelligence, Health Care, System Implementation, Personally Identifiable Information, Data Security, Technology Solutions
Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Threat Management, Governance Risk Management and Compliance, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Risk Analysis, Cyber Operations, Security Information and Event Management (SIEM), Security Controls, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
Skills you'll gain: Generative AI, PyTorch (Machine Learning Library), Artificial Neural Networks, Deep Learning, Tensorflow, Keras (Neural Network Library), Computer Vision, Jupyter, Machine Learning, Matplotlib, NumPy
Skills you'll gain: Endpoint Security, Multi-Factor Authentication, Patch Management, Network Security, Information Systems Security, Cybersecurity, Network Monitoring, Data Security, Authentications, Malware Protection, Mobile Security, Continuous Monitoring, Authorization (Computing), Identity and Access Management
Johns Hopkins University
Skills you'll gain: Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Anomaly Detection, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Predictive Modeling, Data Mining, Artificial Neural Networks
Skills you'll gain: Secure Coding, Full-Stack Web Development, Penetration Testing, Application Security, Web Applications, Security Testing, Web Development, Angular, Web Development Tools, Vulnerability Assessments, Cybersecurity, Ajax, Javascript
LearnQuest
Skills you'll gain: Continuous Monitoring, Security Management, Security Strategy, Risk Management Framework, Cyber Risk, Threat Management, Cyber Security Strategy, System Monitoring, Cloud Security, Security Requirements Analysis, Cybersecurity, Security Controls, Incident Response, Cloud Standards, Scalability
Skills you'll gain: Network Security, Hardening, Endpoint Security, Virtual Private Networks (VPN), Firewall, Network Administration, Cloud Security, Infrastructure Security, Cybersecurity, Role-Based Access Control (RBAC), Identity and Access Management, Enterprise Security, Remote Access Systems, Email Security
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Detection, Threat Modeling, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Application Security, Wireless Networks, Splunk, Information Privacy
In summary, here are 10 of our most popular adversarial+attack+mitigation courses
- Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
- Cutting-Edge Blockchain Security Mechanisms: SkillUp EdTech
- GenAI for Telemedicine Data Security: Coursera Instructor Network
- Advanced Cybersecurity Risk Management: Board Infinity
- Advanced Generative Adversarial Networks (GANs): Packt
- Comprehensive Cisco Security Techniques and Automation: Packt
- Machine Learning and Emerging Technologies in Cybersecurity: Johns Hopkins University
- Web Hacking Expert - Full-Stack Exploitation Mastery: Packt
- Strategic Edge Security Management: LearnQuest
- Advanced Network Security and Endpoint Strategies: Packt