Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "adversarial attack implementation"
DeepLearning.AI
Skills you'll gain: Generative AI, PyTorch (Machine Learning Library), Image Analysis, Deep Learning, Artificial Neural Networks, Data Ethics, Applied Machine Learning, Computer Vision, Machine Learning, Computer Graphics, Computer Graphic Techniques, Data Transformation, Artificial Intelligence and Machine Learning (AI/ML), Information Privacy, Data Synthesis
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
- Status: [object Object]
Microsoft
Skills you'll gain: Earned Value Management, Stakeholder Engagement, Project Closure, Stakeholder Management, Team Performance Management, Team Building, Agile Methodology, Risk Analysis, Agile Project Management, Stakeholder Communications, Project Management Institute (PMI) Methodology, Systems Thinking, Project Risk Management, Project Implementation, Project Performance, Project Planning, Team Management, Virtual Teams, Project Schedules, Project Management Life Cycle
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creativity
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Cyber Threat Intelligence, Incident Response, Cyber Attacks, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Intrusion Detection and Prevention
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Digital Transformation, Cloud Computing Architecture, Stakeholder Engagement, Consulting, Business Transformation, Relationship Management, Business Consulting, Cloud Computing, Management Consulting, Technical Design, System Design and Implementation, Solution Design, User Feedback, Product Strategy, Technical Consulting, Customer Engagement, System Implementation, Professional Networking, Project Management, SAP Applications
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
Vanderbilt University
Skills you'll gain: ChatGPT, Project Planning, Generative AI, Risk Analysis, Milestones (Project Management), Timelines, Project Risk Management, Project Management, Artificial Intelligence, Organizational Skills, Project Implementation, Project Coordination, Project Documentation, Taking Meeting Minutes, Project Schedules, Work Breakdown Structure, Business Metrics, Creative Thinking, Creativity, Natural Language Processing
Johns Hopkins University
Skills you'll gain: Bioinformatics, Unix Commands, Biostatistics, Exploratory Data Analysis, Statistical Analysis, Unix, Data Science, Data Management, Statistical Methods, Command-Line Interface, Statistical Hypothesis Testing, Linux Commands, Science and Research, Statistical Modeling, Data Structures, Data Analysis, R Programming, Computational Thinking, Statistical Programming, Jupyter
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems, Change Management, Business Technologies, Organizational Change, System Implementation, IT Management, Business Process, Business Solutions, Business Management, Business
University of Pennsylvania
Skills you'll gain: Environmental Social And Corporate Governance (ESG), Risk Analysis, Risk Management, Business Risk Management, Stakeholder Management, Corporate Sustainability, Governance, Investment Management, Diversity and Inclusion, Corporate Strategy, Waste Minimization, Investments, Business Ethics, Corporate Communications, Financial Data, Crisis Management, Insurance, Return On Investment, Environmental Resource Management, Portfolio Management
In summary, here are 10 of our most popular adversarial attack implementation courses
- Generative Adversarial Networks (GANs): DeepLearning.AI
- IBM Generative AI for Cybersecurity Professionals: IBM
- Microsoft Project Management: Microsoft
- Generative AI Cybersecurity & Privacy for Leaders: Vanderbilt University
- Python for Cybersecurity: Infosec
- Cybersecurity Threat Vectors and Mitigation: Microsoft
- SAP Technology Consultant: SAP
- Assets, Threats, and Vulnerabilities: Google
- ChatGPT for Project Management - Leveraging AI for Success: Vanderbilt University
- Genomic Data Science: Johns Hopkins University