Showing 1213–1224 of 4482 results

Deep Learning for Developer Crash Course, Part 2
Don't miss the upcoming Microsoft Azure + AI event on December 8-10, 2020 in Las Vegas, Nevada.

Deep Learning Instances and Frameworks on AWS
This course will cover the launching and configuration of EC2 instances using the Deep Learning AMIs provided by AWS as well as leveraging the included deep learning frameworks.

Deep Learning Topics with Computer Vision and NLP
Explore advanced deep learning topics that integrate computer vision and natural language processing.

Deep Learning with JAX and Flax
Discover how to build deep learning models using JAX and Flax, leveraging modern Python libraries for high-performance machine learning.

Deep Learning with JAX and Flax
Explore deep learning techniques using JAX and Flax, focusing on efficient model training and deployment with an emphasis on performance and scalability.

Deep Learning with JAX and Flax
Explore deep learning techniques using JAX and Flax, focusing on performance optimization and advanced model building.

Deep Learning with Keras 2
Deep Learning lies at the heart of many leading machine learning and artificial intelligence applications. This course, Deep Learning with Keras, shows you how to use Keras to quickly create powerful deep neural networks.

Defeating Injection Attacks in ASP.NET and ASP.NET Core
Web applications are at constant risk of attack, and one of the most common attacks is the dreaded injection attack. This course will show you how to defeat three common injection attacks, including SQL Injection, in ASP.NET and ASP.NET Core.

Defense Evasion with Invoke-Obfuscation
Staying undetected is essential in a red team engagement. In this course, you will learn how to obfuscate malicious scripts to bypass anti-virus solutions using the Invoke-Obfuscation tool.

Defense Evasion with ProxyChains
Network security tools are the most common line of defense in a company. In this course, you will learn how to use ProxyChains to re-route your network traffic and bypass such security tools.

Defense Evasion with Veil
In this course, Red Teamers will learn how to utilize the Veil to easily create unique payloads which will execute your preferred payload. T1027 on the specified target system T1480.001.

Defining Objectives for IT Governance and Management
Enterprise governance of information and technology is based on processes. This course will teach you how to define processes for both governance and management.