Search result for Computer security and networks Online Courses & Certifications
Get Course Alerts by Email
Computer Forensics
by Yin Pan- 0.0
8 Weeks
Learn the process, techniques and tools for performing a digital forensics investigation to obtain data related to computer crimes. In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. Attributes of various Windows and Unix/Linux file systems and file recovery processes Review and critique a forensics report...
$249
Browser-based Models with TensorFlow.js
by Laurence Moroney- 4.7
Approx. 17 hours to complete
This Specialization will teach you how to navigate various deployment scenarios and use data more effectively to train your model. You’ll learn techniques for handling data in the browser, and at the end you’ll build a computer vision project that recognizes and classifies objects from a webcam. Downloading the Ungraded Labs and Programming Assignments...
Python For Vision and Detection : OpenCv Python
by Programming Academy- Learn and Create- 0.0
11.5 hours on-demand video
Computer vision allows us to analyze and leverage image and video data, with applications in a variety of industries, including self-driving cars, social network apps, medical diagnostics, and many more. As the fastest growing language in popularity, Python is well suited to leverage the power of existing computer vision libraries to learn from all this image and video data....
$12.99
Autonomous Cars: Deep Learning and Computer Vision in Python
by Sundog Education by Frank Kane- 4.2
13 hours on-demand video
Autonomous Cars: Computer Vision and Deep Learning The course provides students with practical experience in various self-driving vehicles concepts such as machine learning and computer vision. Tools and algorithms we'll cover include: Deep Learning and Artificial Neural Networks Build deep neural networks with Tensorflow and Keras Classify data with artificial neural networks and deep learning...
$12.99
Computer Security: A Hands-on Approach
by Wenliang Du- 4.6
12 hours on-demand video
Attacks and defense: buffer overflow, race condition, dirty COW, meltdown and spectre , shellshock, format string This course focuses on a variety of attacks on computer systems. Some of them are classical attacks, and some are quite new, such as the recently discovered Dirty COW, Meltdown, and Spectre attacks....
$16.99
CCNP Route -300-101
by sikandar Shaik- 4.5
30.5 hours on-demand video
This Cisco video training course covers the material needed for the 300-101 Cisco ROUTE exam with more on real-world experience and detailed technical details with more Hands on labs. This course is lab-based and is focused on the technologies from Cisco CCNP Route/Switch (300-101). Each Video is designed assist you in creating and verifying Cisco networks using GNS3 1....
$19.99
Offensive Python | Mastering Ethical Hacking Using Python
by Mohammad Askar- 0.0
4 hours on-demand video
This course will teach you how to use python programming language during any penetration testing or ethical hacking operation , it will teach you how to write your own ethical hacking scripts on various information security fields like network security , web application security , and endpoint security. Build an ethical hacking tools with python to perform security test on wireless networks...
$12.99
Related searches
IT Networking Fundamentals: CompTIA Network+ 2016
by LearnSmart LLC- 0.0
15.5 hours on-demand video
Sections 2: Understand how transmission Control Protocol/Internet Protocol is a nonproprietary industry-standard protocol suite that provides communications on networks that support various operating systems and hardware types. Section 6: A wide area network (WAN) is a network that spans larger geographical distances and connects multiple local area networks (LANs) together using high-speed communication lines....
$199.99
Complete Penetration Testing and Ethical hacking Bootcamp
by Igneus Technologies- 0.0
11 hours on-demand video
Get started from scratch and become job ready penetration Tester. Be an Ethical Hacker and Hunt as a Bug Bounty Hunters When you learn about Information security and that too at such a practical level, you can offer your skills to big and small companies get hired there or work as a free lancer....
$12.99
Convolutional Neural Networks in TensorFlow
by Laurence Moroney- 4.7
Approx. 26 hours to complete
You will explore how to work with real-world images in different shapes and sizes, visualize the journey of an image through convolutions to understand how a computer “sees” information, plot loss and accuracy, and explore strategies to prevent overfitting, including augmentation and dropout. Looking at accuracy and loss and this Course...