Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "adversarial attack mitigation"
- Status: New
Skills you'll gain: Data Storytelling, Requirements Elicitation, Risk Mitigation, Business Analysis, Business Process Modeling, Data Presentation, Risk Analysis, Project Scoping, Process Mapping, Process Optimization, Data Visualization, Requirements Management, Risk Management, Interactive Data Visualization, Business Requirements, Stakeholder Management, Stakeholder Engagement, Excel Formulas, Microsoft Excel, Analysis
DeepLearning.AI
Skills you'll gain: Generative AI, PyTorch (Machine Learning Library), Image Analysis, Deep Learning, Artificial Neural Networks, Applied Machine Learning, Data Ethics, Computer Graphics, Machine Learning
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
DeepLearning.AI
Skills you'll gain: Generative AI, PyTorch (Machine Learning Library), Data Ethics, Deep Learning, Machine Learning, Image Analysis, Computer Graphic Techniques, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML)
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
Microsoft
Skills you'll gain: Network Security, Network Protocols, TCP/IP, Cloud Computing, Firewall, Cloud Services, Cybersecurity, General Networking, Networking Hardware, Network Architecture, OSI Models, Microsoft Azure, Computer Networking, Network Infrastructure, Virtualization, Microsoft Servers
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Data Security, Application Security, Vulnerability Management, Threat Detection, Malware Protection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management
- Status: New
Skills you'll gain: Risk Mitigation, Generative AI, Risk Analysis, Competitive Intelligence, Feasibility Studies, Data Ethics, Brainstorming, Business Priorities, Return On Investment, Data Strategy, Business Leadership, Goal Setting, Artificial Intelligence, Business Solutions, Ideation, Business Strategy, Writing, Scalability, Business Transformation, Business Ethics
University of California, Irvine
Skills you'll gain: Project Performance, Project Risk Management, Risk Analysis, Scope Management, Change Management, Risk Mitigation, Project Documentation, Project Closure, Stakeholder Communications, Communication
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Computer Security Awareness Training, Risk Management, Vulnerability Assessments, Enterprise Security, Cyber Security Assessment
In summary, here are 10 of our most popular adversarial attack mitigation courses
- IBM Business Analyst:Â IBM
- Build Basic Generative Adversarial Networks (GANs):Â DeepLearning.AI
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Build Better Generative Adversarial Networks (GANs):Â DeepLearning.AI
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- Microsoft Azure Cybersecurity Tools and Solutions:Â Microsoft
- Introduction to Secure Networking:Â Microsoft
- Cybersecurity Tools and Technologies:Â Microsoft
- Mitigating Security Vulnerabilities on Google Cloud:Â Google Cloud
- Generative AI for Executives and Business Leaders:Â IBM