Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "model attack methods"
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Threat Modeling, Jupyter, Authentications, Intrusion Detection and Prevention, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Artificial Intelligence and Machine Learning (AI/ML), Computer Vision, Natural Language Processing, Machine Learning, Deep Learning
Skills you'll gain: Penetration Testing, Threat Modeling, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Security Testing, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Authorization (Computing), Databases
- Status: Free Trial
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Malware Protection, Network Security, Firewall, Threat Detection, Cloud Security, Endpoint Security, Enterprise Security, Continuous Monitoring, Software As A Service, Cloud Computing, Cryptography, Authentications
- Status: Free Trial
DeepLearning.AI
Skills you'll gain: Tensorflow, Application Deployment, MLOps (Machine Learning Operations), Deep Learning, Applied Machine Learning, Machine Learning, Information Privacy, Web Servers, Artificial Neural Networks, Data Security, Data Visualization
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Applied Machine Learning, Malware Protection, Cyber Threat Intelligence, Cyber Security Strategy, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Cybersecurity, Threat Detection, MLOps (Machine Learning Operations), Machine Learning, Network Security, Machine Learning Algorithms, Network Analysis, Artificial Intelligence, Data-Driven Decision-Making, Artificial Neural Networks
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cybersecurity, Network Security, Network Protocols, Network Analysis, Vulnerability Assessments, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Unix, Computer Security, Application Security, Vulnerability Assessments, Unix Commands, Microsoft Windows, System Programming, Linux, Debugging, Command-Line Interface, Windows PowerShell, Computer Architecture, OS Process Management
- Status: Free Trial
DeepLearning.AI
Skills you'll gain: iOS Development, Android Development, Tensorflow, Swift Programming, Mobile Development, Applied Machine Learning, Embedded Systems, Machine Learning Methods, Computer Vision, Machine Learning
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Unsupervised Learning, Applied Machine Learning, Dimensionality Reduction, Reinforcement Learning, Regression Analysis, Machine Learning, Data Mining, Machine Learning Algorithms, Statistical Machine Learning, Advanced Analytics, Predictive Modeling, Random Forest Algorithm, Decision Tree Learning, Supervised Learning
- Status: Free Trial
Icahn School of Medicine at Mount Sinai
Skills you'll gain: Matlab, Mathematical Modeling, Differential Equations, Computational Logic, Applied Mathematics, Molecular Biology, Simulations, Statistical Modeling, Biochemistry, Biology, Probability, Electrical Systems
In summary, here are 10 of our most popular model attack methods courses
- Introduction to AI for Cybersecurity:Â Johns Hopkins University
- Web Hacking Expert - Full-Stack Exploitation Mastery:Â Packt
- Hands-On Web App Pentesting:Â Packt
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Advanced Deployment Scenarios with TensorFlow:Â DeepLearning.AI
- AI for Cyber Security:Â Macquarie University
- Exploit Development, Malware, & Defensive Strategies:Â Packt
- Security & Ethical Hacking: Attacking Unix and Windows :Â University of Colorado Boulder
- Device-based Models with TensorFlow Lite:Â DeepLearning.AI