Search result for Computer security and networks Online Courses & Certifications
Get Course Alerts by Email
Machine Learning: Beginner Reinforcement Learning in Python
by Milo Spencer-Harper- 4.6
2 hours on-demand video
Some of the most exciting advances in artificial intelligence have occurred by challenging neural networks to play games. Using this example I will teach you Deep Q Learning - a revolutionary technique invented by Google DeepMind to teach neural networks to play chess, Go and Atari....
$11.99
[2020] Machine Learning and Deep Learning Bootcamp in Python
by Holczer Balazs- 4.5
18.5 hours on-demand video
Computer Vision and Face Detection with OpenCV Neural Networks: what are feed-forward neural networks and why are they useful Deep Learning: feedforward neural networks and deep neural networks are the state-of-the-art approaches in artificial intelligence in 2020. Recurrent Neural Networks and Convolutional Neural Networks and their applications such as sentiment analysis or stock prices forecast...
$17.99
Security Awareness Training
by Michael Biocchi- 4.6
2 hours on-demand video
A basic guide to staying safe online and to introduce new knowledge to people about internet security and privacy. Come join over 25,000 students in learning about computer security! You don't need to be a computer science major to take this! The course is taught mostly through video and there are quizzes at the end of each section....
$14.99
Fundamentals of the OpenStack Cloud with Hands-on Labs
by Naveen Joy- 4.4
7.5 hours on-demand video
Deploy a multinode OpenStack cluster on your Mac, Windows or Linux system and master it by doing hands-on labs We will get into the details of all the core OpenStack cloud services and understand in-depth as to how things work using practice labs. Deploy a multinode Pike OpenStack cluster on your computer consisting of a cloud controller and compute node...
$18.99
Cybersecurity Roles and Operating System Security
by Coreen Ryskamp- 0.0
7 Weeks
process and technology. It is also important as a cybersecurity professional to understand basic commands and operating systems to secure your organization’s computer security systems or communicate with the security professionals responsible for that function in your organization. List key cybersecurity processes and an example of each process. Define authentication and access control methods....
$149
Synapses, Neurons and Brains
by Idan Segev- 4.8
Approx. 20 hours to complete
You will then become intimately acquainted with the operational principles of neuronal “life-ware” (synapses, neurons and the networks that they form) and consequently, on how neurons behave as computational microchips and how they plastically and constantly change - a process that underlies learning and memory. Welcome Words and Great Thinkers Brain Excitements for the 21st Century and The Materialistic Mind...
Information Security - Authentication and Access Control
by Aspen Olmsted- 0.0
6 Weeks
Learn more fundamentals of information security, including Introduction to Cryptography, Authentication, Access Control and Containerization. Information Security - Authentication and Access Control These topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor. This is a self-paced course that provides a continuation of information security and cybersecurity topics....
$166
Related searches
TCP/IP and Advanced Topics
by Xiaobo Zhou- 4.7
Approx. 16 hours to complete
We pay particular attention to the hierarchical structure of IP addresses and explain their role in ensuring scalability of the Internet. Furthermore, we provide an introduction to some advanced topics, including Multicast, SDN and security Lecture Slide - TCP/IP Architecture and IP Packet Practice Assessment - TCP/IP and Advanced Topics TCP/IP and Advanced Topics...
Introduction to Deep Learning
by Evgeny Sokolov , Зимовнов Андрей Вадимович , Alexander Panin , Ekaterina Lobacheva , Nikita Kazeev- 4.5
Approx. 34 hours to complete
The goal of this course is to give learners basic understanding of modern neural networks and their applications in computer vision and natural language understanding. Learners will study all popular building blocks of neural networks including fully connected layers, convolutional and recurrent layers. Derivatives of MSE and cross-entropy loss functions. Overfitting problem and model validation...
Hacking and Penetration Testing from Scratch with METASPLOIT
by IT Security Academy- 0.0
3 hours on-demand video
Learn how to test security mechanisms and how to conduct penetration tests on working machines or databases. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. IT Security Adacemy Expert will explain how it works and how to use Metasploit....
$13.99