Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "évaluations de la vulnérabilité"
Skills you'll gain: Firewall, Network Security, Cloud Security, Cloud Infrastructure, Google Cloud Platform, Network Infrastructure, Threat Detection
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Coursera Project Network
Skills you'll gain: Usability Testing, Usability, Test Tools, Interaction Design, Human Computer Interaction, Test Planning, User Research, Product Development, Web Analytics and SEO
Skills you'll gain: MLOps (Machine Learning Operations), Generative AI, Continuous Monitoring, Predictive Modeling, System Monitoring, Google Cloud Platform, Data Ethics, Responsible AI, Machine Learning
- Status: Free Trial
Coursera Instructor Network
Skills you'll gain: Responsible AI, LLM Application, Large Language Modeling, Program Evaluation, Generative AI, Data Ethics, Google Cloud Platform, Quality Assessment, Verification And Validation, Image Quality, User Feedback, Human Factors, Performance Metric
- Status: Free Trial
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
In summary, here are 6 of our most popular évaluations de la vulnérabilité courses
- Evaluate Your Cloud Next Generation Firewall Needs: Google Cloud
- AI for Cybersecurity: Johns Hopkins University
- Usability Testing with Hotjar: Coursera Project Network
- Machine Learning Operations with Vertex AI: Model Evaluation: Google Cloud
- Evaluating Large Language Model Outputs: A Practical Guide: Coursera Instructor Network
- System Hacking, Malware Threats, and Network Attacks: Packt