×

Identifying Security Requirements of an AI Solution

Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare+
Duration

1h 29m

level

Beginner

Course Creator

Brian Harrison

Last Updated

12-Dec-19

Category:

In this course, you will walk through the services used to create an AI solution in Azure and the requirements to secure the solution, including data security and deployment security of Machine Learning models and Cognitive Services.

Add your review

Learn what it takes to secure your newly developed and/or deployed AI solution in Microsoft Azure. In this course, Identifying Security Requirements of an AI solution, you will learn foundational knowledge to secure your AI Solution no matter whether you are leveraging Azure Cognitive Services or custom machine learning models. First, you will discover how to leverage Azure Cognitive Services in a secure authenticated way. Next, you will learn what security options are available for any test data that you need to train the models of both Cognitive Services and machine learning models. Finally, you will explore how to secure the deployment of an AI solution using machine learning models. When you are finished with this course, you will have the skills and knowledge of security options within Azure Services needed to secure an AI solution from development to deployment.
Author Name: Brian Harrison
Author Description:
Brian has been working in the Cloud space for more than a decade as both a Cloud Architect and Cloud Engineer. He has experience building Application Development, Infrastructure, and AI-based architectures using many different OSS and Non-OSS based technologies. In addition to his work at Pluralsight, he is always trying to educate customers about how to get started in the cloud with his many blogs and videos. He is currently working as a Cloud Solution Architect for Microsoft designing solution… more

Table of Contents

  • Course Overview
    1min
  • Working with Authorization and Authentication
    23mins
  • Security of Test Data
    30mins
  • Securing an AI Solution Deployment
    33mins

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Identifying Security Requirements of an AI Solution”

Your email address will not be published. Required fields are marked *

Identifying Security Requirements of an AI Solution
Identifying Security Requirements of an AI Solution
Edcroma
Logo
Compare items
  • Total (0)
Compare
0
https://login.stikeselisabethmedan.ac.id/produtcs/
https://hakim.pa-bangil.go.id/
https://lowongan.mpi-indonesia.co.id/toto-slot/
https://cctv.sikkakab.go.id/
https://hakim.pa-bangil.go.id/products/
https://penerimaan.uinbanten.ac.id/
https://ssip.undar.ac.id/
https://putusan.pta-jakarta.go.id/
https://tekno88s.com/
https://majalah4dl.com/
https://nana16.shop/
https://thamuz12.shop/
https://dprd.sumbatimurkab.go.id/slot777/
https://dprd.sumbatimurkab.go.id/
https://cctv.sikkakab.go.id/slot-777/
https://hakim.pa-kuningan.go.id/
https://hakim.pa-kuningan.go.id/slot-gacor/
https://thamuz11.shop/
https://thamuz15.shop/
https://thamuz14.shop/
https://ppdb.smtimakassar.sch.id/
https://ppdb.smtimakassar.sch.id/slot-gacor/
slot777
slot dana
majalah4d
slot thailand
slot dana
rtp slot
toto slot
slot toto
toto4d
slot gacor
slot toto
toto slot
toto4d
slot gacor
tekno88
https://lowongan.mpi-indonesia.co.id/
https://thamuz13.shop/
https://www.alpha13.shop/
https://perpustakaan.smkpgri1mejayan.sch.id/
https://perpustakaan.smkpgri1mejayan.sch.id/toto-slot/
https://nana44.shop/
https://sadps.pa-negara.go.id/
https://sadps.pa-negara.go.id/slot-777/
https://peng.pn-baturaja.go.id/
https://portalkan.undar.ac.id/
https://portalkan.undar.ac.id/toto-slot/
https://penerimaan.ieu.ac.id/
https://sid.stikesbcm.ac.id/