Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "adversarial attack implementation"
Board Infinity
Skills you'll gain: Angular, Web Applications, HTML and CSS, Web Development, Eclipse (Software), JavaScript Frameworks, Spring Boot, Object Oriented Programming (OOP), Restful API, Java Programming, Model View Controller, Object Oriented Design, Hypertext Markup Language (HTML), Front-End Web Development, Software Development Tools, Spring Framework, Java, Web Services, Javascript, Integrated Development Environments
Skills you'll gain: Azure Active Directory, Authentications, Identity and Access Management, Authorization (Computing), Active Directory, Role-Based Access Control (RBAC), Multi-Factor Authentication, Single Sign-On (SSO), Software As A Service, User Accounts
University of Colorado Boulder
Skills you'll gain: Field-Programmable Gate Array (FPGA), Hardware Design, Electronic Hardware, Electronic Systems, Embedded Systems, Systems Design, Application Specific Integrated Circuits, Semiconductors, Schematic Diagrams, Technical Design, Integrated Development Environments, Electrical and Computer Engineering, System Design and Implementation, Computer Architecture, Software Development Tools, Hardware Architecture, Software Development, Software Design, Simulation and Simulation Software, Development Environment
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Google Cloud
Skills you'll gain: Natural Language Processing, MLOps (Machine Learning Operations), Tensorflow, Reinforcement Learning, Computer Vision, Google Cloud Platform, Keras (Neural Network Library), Systems Design, Image Analysis, Hybrid Cloud Computing, Applied Machine Learning, Systems Architecture, Performance Tuning, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, Machine Learning, Machine Learning Algorithms, Distributed Computing, Unsupervised Learning
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Data Security, Application Security, Vulnerability Management, Threat Detection, Malware Protection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management
DeepLearning.AI
Skills you'll gain: Generative AI, PyTorch (Machine Learning Library), Image Analysis, Deep Learning, Artificial Neural Networks, Applied Machine Learning, Data Ethics, Computer Graphics, Machine Learning
DeepLearning.AI
Skills you'll gain: Generative AI, PyTorch (Machine Learning Library), Data Ethics, Computer Vision, Deep Learning, Applied Machine Learning, Machine Learning, Data Transformation, Information Privacy, Data Synthesis
University of Pennsylvania
Skills you'll gain: Environmental Social And Corporate Governance (ESG), Risk Analysis, Risk Management, Business Risk Management, Stakeholder Management, Corporate Sustainability, Governance, Investment Management, Diversity and Inclusion, Corporate Strategy, Waste Minimization, Investments, Business Ethics, Corporate Communications, Financial Data, Crisis Management, Insurance, Return On Investment, Environmental Policy, Portfolio Management
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Cyber Threat Intelligence, Incident Response, Cyber Attacks, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Intrusion Detection and Prevention
Skills you'll gain: Business Intelligence, Data Integration, Stakeholder Engagement, Dashboard, Data Modeling, Business Analytics, Real Time Data, Requirements Elicitation, Data Storytelling, Data Analysis, Business Metrics, Key Performance Indicators (KPIs), Data Pipelines, Project Implementation
In summary, here are 10 of our most popular adversarial attack implementation courses
- Java FullStack Developer: Board Infinity
- Cybersecurity Identity and Access Solutions using Azure AD: Microsoft
- FPGA Design for Embedded Systems: University of Colorado Boulder
- Microsoft Azure Cybersecurity Tools and Solutions: Microsoft
- Cybersecurity Threat Vectors and Mitigation: Microsoft
- Advanced Machine Learning on Google Cloud: Google Cloud
- Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
- Build Basic Generative Adversarial Networks (GANs): DeepLearning.AI
- Apply Generative Adversarial Networks (GANs): DeepLearning.AI
- The Materiality of ESG Factors: University of Pennsylvania