Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "adversarial attack implementation"
- Status: Preview
Nanjing University
Skills you'll gain: Operating Systems, Computer Systems, File Systems, OS Process Management, Software Systems, Computer Science, System Design and Implementation, Data Storage, Computer Hardware, Peripheral Devices, Virtual Machines, Algorithms, Human Computer Interaction
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Molecular Biology, Electrical Engineering, Chemical and Biomedical Engineering, Engineering Design Process, Systems Design, Bioinformatics, Biochemistry, Research Design, Biology, Computational Logic, Control Systems, Experimentation, Laboratory Experience, Technical Standard, Design Software
- Status: Free Trial
Skills you'll gain: Incident Response, Business Continuity, Disaster Recovery, Cybersecurity, Security Management, Computer Security Incident Management, Crisis Management, Information Assurance
- Status: Free Trial
Skills you'll gain: Field-Programmable Gate Array (FPGA), Hardware Design, Serial Peripheral Interface, Electronic Hardware, Internet Of Things, Embedded Systems, Embedded Software, Network Protocols, Digital Communications, Computer Architecture, Hardware Architecture, Software Development Tools, System Design and Implementation, Software Installation, Verification And Validation
Skills you'll gain: Unified Modeling Language, Embedded Systems, Internet Of Things, Software Development Life Cycle, Systems Architecture, Systems Design, Software Architecture, Technical Design, Prototyping, Requirements Analysis
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Deep Learning, Unsupervised Learning, PyTorch (Machine Learning Library), Keras (Neural Network Library), Artificial Neural Networks, Tensorflow, Artificial Intelligence and Machine Learning (AI/ML), Computer Vision, Image Analysis, Natural Language Processing, Applied Machine Learning, Machine Learning Algorithms, Performance Tuning
- Status: Preview
Board Infinity
Skills you'll gain: Vulnerability Assessments, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Cyber Security Assessment, Command-Line Interface, Cybersecurity, Linux, Network Security, Intrusion Detection and Prevention, Software Installation, Network Analysis, Encryption
- Status: Preview
Skills you'll gain: Systems Development Life Cycle, Unified Modeling Language, Systems Engineering, Systems Design, Software Systems, Systems Architecture, Systems Analysis, Systems Integration, Simulations, Solution Architecture, Requirements Analysis, Verification And Validation, Cloud Computing
- Status: Preview
University of Washington
Skills you'll gain: Organizational Skills, Artificial Intelligence, Systems Design, Functional Design, Goal Setting, Verification And Validation, Reinforcement Learning, Functional Specification, Knowledge Transfer, Software Architecture, Interviewing Skills, Software Design Patterns, Decision Making
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Power Electronics, Electronic Systems, Electrical Engineering, Control Systems, Electronics Engineering, Electronics, Simulations, Mathematical Modeling, Engineering Analysis, Systems Design, Verification And Validation, Systems Analysis
- Status: Free Trial
Skills you'll gain: Cryptography, Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Computer Networking, Threat Modeling, Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy, OSI Models
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Root Cause Analysis, Operational Efficiency, Corrective and Preventive Action (CAPA), Continuous Improvement Process, Product Quality (QA/QC), Process Improvement, Operational Excellence, Proactivity, Complex Problem Solving
In summary, here are 10 of our most popular adversarial attack implementation courses
- 计算机操作系统: Nanjing University
- Engineering Genetic Circuits: Design: University of Colorado Boulder
- Incident Response, BC, and DR Concepts: ISC2
- FPGA Architecture Based System for Industrial Application : L&T EduTech
- Introduction to Architecting Smart IoT Devices: EIT Digital
- Introduction to Deep Learning: University of Colorado Boulder
- Kali Linux: Board Infinity
- Introduction to Model-Based Systems Engineering: Siemens
- Designing Autonomous AI: University of Washington
- Averaged-Switch Modeling and Simulation: University of Colorado Boulder