Enterprise Security: AI in Authentication & Detection of Security Threats
Generative AI
| Intermediate
- 13 videos | 3h 12m 15s
- Includes Assessment
- Earns a Badge
Authentication refers to the process of validating the identity of a registered user or process to ensure a subject is who they claim to be. In this course, you will explore the role of artificial intelligence (AI) in authentication and how it can be leveraged to confirm a user's identity through a selfie, fingerprint, or voice recognition. Discover common authentication vulnerabilities, including SQL injection, username enumeration, and weak login credentials, and investigate how behavioral biometrics can analyze a user's physical and cognitive behavior to determine threats. Learn about other areas to consider when building a secure authentication solution, including anomaly detection, adaptive authentication, voice recognition, and facial recognition. Finally, find out how to detect security threats using AI and examine how AI models can streamline a common authentication process.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseList common authentication vulnerabilities including sql injection, username enumeration, and weak login credentialsDescribe ai's role in authenticationOutline different types of ai authenticationProvide an overview of biometric authenticationProvide an overview of behavioral biometrics and how it can analyze a user's digital physical and cognitive behavior to determine threatsDescribe how ai authentication systems can help mitigate ai bias
-
Describe how ai is used in facial recognitionOutline how speech recognition has become a significant part of ai applicationsDescribe how anomaly detection can be used to identify unusual or suspicious activityOutline how continuous authentication assesses user behavior patterns on an ongoing basis to identify potential risk factorsDescribe how adaptive authentication can be used to verify user identitySummarize the key concepts covered in this course
IN THIS COURSE
-
1m 13sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
21m 30sAfter completing this video, you will be able to list common authentication vulnerabilities including SQL injection, username enumeration, and weak login credentials. FREE ACCESS
-
15m 27sUpon completion of this video, you will be able to describe AI's role in authentication. FREE ACCESS
-
18mAfter completing this video, you will be able to outline different types of AI authentication. FREE ACCESS
-
17m 37sUpon completion of this video, you will be able to provide an overview of biometric authentication. FREE ACCESS
-
15m 6sAfter completing this video, you will be able to provide an overview of behavioral biometrics and how it can analyze a user's digital physical and cognitive behavior to determine threats. FREE ACCESS
-
14m 59sUpon completion of this video, you will be able to describe how AI authentication systems can help mitigate AI bias. FREE ACCESS
-
16m 15sAfter completing this video, you will be able to describe how AI is used in facial recognition. FREE ACCESS
-
15m 14sUpon completion of this video, you will be able to outline how speech recognition has become a significant part of AI applications. FREE ACCESS
-
19m 10sAfter completing this video, you will be able to describe how anomaly detection can be used to identify unusual or suspicious activity. FREE ACCESS
-
21m 8sUpon completion of this video, you will be able to outline how continuous authentication assesses user behavior patterns on an ongoing basis to identify potential risk factors. FREE ACCESS
-
15m 48sAfter completing this video, you will be able to describe how adaptive authentication can be used to verify user identity. FREE ACCESS
-
49sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.