Enterprise Security: AI in Authentication & Detection of Security Threats

Generative AI    |    Intermediate
  • 13 videos | 3h 12m 15s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 13 users Rating 4.8 of 13 users (13)
Authentication refers to the process of validating the identity of a registered user or process to ensure a subject is who they claim to be. In this course, you will explore the role of artificial intelligence (AI) in authentication and how it can be leveraged to confirm a user's identity through a selfie, fingerprint, or voice recognition. Discover common authentication vulnerabilities, including SQL injection, username enumeration, and weak login credentials, and investigate how behavioral biometrics can analyze a user's physical and cognitive behavior to determine threats. Learn about other areas to consider when building a secure authentication solution, including anomaly detection, adaptive authentication, voice recognition, and facial recognition. Finally, find out how to detect security threats using AI and examine how AI models can streamline a common authentication process.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    List common authentication vulnerabilities including sql injection, username enumeration, and weak login credentials
    Describe ai's role in authentication
    Outline different types of ai authentication
    Provide an overview of biometric authentication
    Provide an overview of behavioral biometrics and how it can analyze a user's digital physical and cognitive behavior to determine threats
    Describe how ai authentication systems can help mitigate ai bias
  • Describe how ai is used in facial recognition
    Outline how speech recognition has become a significant part of ai applications
    Describe how anomaly detection can be used to identify unusual or suspicious activity
    Outline how continuous authentication assesses user behavior patterns on an ongoing basis to identify potential risk factors
    Describe how adaptive authentication can be used to verify user identity
    Summarize the key concepts covered in this course

IN THIS COURSE

  • Locked
    1.  Course Overview
    1m 13s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • Locked
    2.  Common Authentication Vulnerabilities
    21m 30s
    After completing this video, you will be able to list common authentication vulnerabilities including SQL injection, username enumeration, and weak login credentials. FREE ACCESS
  • Locked
    3.  Artificial Intelligence (AI) and Authentication
    15m 27s
    Upon completion of this video, you will be able to describe AI's role in authentication. FREE ACCESS
  • Locked
    4.  Types of AI Authentication
    18m
    After completing this video, you will be able to outline different types of AI authentication. FREE ACCESS
  • Locked
    5.  Biometric Authentication
    17m 37s
    Upon completion of this video, you will be able to provide an overview of biometric authentication. FREE ACCESS
  • Locked
    6.  Behavioral Biometrics
    15m 6s
    After completing this video, you will be able to provide an overview of behavioral biometrics and how it can analyze a user's digital physical and cognitive behavior to determine threats. FREE ACCESS
  • Locked
    7.  Artificial Intelligence Bias
    14m 59s
    Upon completion of this video, you will be able to describe how AI authentication systems can help mitigate AI bias. FREE ACCESS
  • Locked
    8.  Facial Recognition
    16m 15s
    After completing this video, you will be able to describe how AI is used in facial recognition. FREE ACCESS
  • Locked
    9.  Voice Recognition
    15m 14s
    Upon completion of this video, you will be able to outline how speech recognition has become a significant part of AI applications. FREE ACCESS
  • Locked
    10.  Anomaly Detection
    19m 10s
    After completing this video, you will be able to describe how anomaly detection can be used to identify unusual or suspicious activity. FREE ACCESS
  • Locked
    11.  Continuous Authentication
    21m 8s
    Upon completion of this video, you will be able to outline how continuous authentication assesses user behavior patterns on an ongoing basis to identify potential risk factors. FREE ACCESS
  • Locked
    12.  Adaptive Authentication
    15m 48s
    After completing this video, you will be able to describe how adaptive authentication can be used to verify user identity. FREE ACCESS
  • Locked
    13.  Course Summary
    49s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.5 of 407 users Rating 4.5 of 407 users (407)