Tag: Securing

Securing the Use of Generative AI in Your Organization


Free Download Securing the Use of Generative AI in Your Organization
Released 12/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 1h 19m | Size: 195 MB
As generative AI continues to transform industries and drive innovation, it becomes increasingly crucial for organizations to understand how to secure its usage effectively. This course with instructor Jerich Beason seeks to equip you with the knowledge and skills to navigate the evolving landscape of AI security, enabling you to confidently leverage generative AI while mitigating risks, safeguarding sensitive information, and fortifying their organization’s digital resilience. Learn about the cybersecurity risks of generative AI, how to implement effective governance, risk, and compliance (GRC) processes for LLMs, the fundamentals for detecting and mitigating attacks on generative AI, and the ethical considerations of generative AI. Jerich ends the course with a look at some important AI security strategies and frameworks.

(more…)

Securing SQL Server Applications


Free Download Securing SQL Server Applications
Released 11/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Beginner | Genre: eLearning | Language: English + vtt | Duration: 2h 6m | Size: 369 MB
Dive deep into SQL Server application security! Learn vital techniques to protect data, detect vulnerabilities, and implement robust security practices to safeguard your applications.

(more…)

Azure AI Tips for Developers Securing Your Data


Free Download Azure AI Tips for Developers Securing Your Data
Released: 10/2023
Duration: 23m | .MP4 1280×720, 30 fps(r) | AAC, 48000 Hz, 2ch | 55 MB
Level: Intermediate | Genre: eLearning | Language: English
Security is paramount in Azure AI development, due to the vulnerability of machine learning models to adversarial attacks on training data. To mitigate these risks, it’s crucial to validate and sanitize training data, employ secure data transfer protocols, and protect sensitive or personal information within training data. In this course, programmer and UI designer Walt Ritscher presents useful security tips for developers. Understand the significance of security in Azure AI development and its implications for machine learning models. Go over techniques for validating and sanitizing training data to protect against adversarial attacks and maintain model accuracy. Explore secure data transfer protocols to ensure the integrity and confidentiality of data during system interactions. Plus, find out how to implement auditing, logging, and monitoring systems for anomaly detection, security maintenance, and regulatory compliance in Azure AI projects.

(more…)

Human Security Securing East Asia’s Future


Free Download Benny Teh Cheng Guan, "Human Security: Securing East Asia’s Future"
English | 2012 | pages: 265 | ISBN: 9401782822, 9400717989 | PDF | 2,0 mb
Human security is becoming increasingly pronounced in recent years due to changes in the security landscape of world politics. Yet, inter-state relations have continued to dominate security concerns in East Asia. This has, unfortunately, eluded the broader understanding of issues and challenges facing the peoples of East Asia.

(more…)

Securing the IoT Privacy (2023)


Free Download Securing the IoT Privacy (2023)
Released 8/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Beginner | Genre: eLearning | Language: English + srt | Duration: 1h 20m | Size: 179 MB
The Internet of Things (IoT) connects people, infrastructures, and things to improve our lives and enhance production of goods and services. The rapid expansion of IoT technology brings with it an array of exciting and imaginative ways to make our products smarter and our lives easier. But the growth of this emerging technology also brings huge gaps in security. Along with limitless possibilities of the IoT in our business and personal lives, we also need to deal with the growing risks to our privacy.

(more…)