Aspire Journeys
672 AI Test & Evaluation Specialist Beginner KSAT Journey
- 30 Courses | 39h 54m 40s
Performs testing, evaluation, verification, and validation on AI solutions to ensure they are developed to be and remain robust, resilient, responsible, secure, and trustworthy; and communicates results and concerns to leadership.
672 AI Test & Evaluation Specialist
Performs testing, evaluation, verification, and validation on AI solutions to ensure they are developed to be and remain robust, resilient, responsible, secure, and trustworthy; and communicates results and concerns to leadership.
- 30 Courses | 39h 54m 40s
COURSES INCLUDED
Agile Organizations: Cloud for Agile Software Development
The cloud has various deployment and service models that can be combined with Agile software development methodologies to help your organization design and create your very own cloud strategy based on your organization's needs. In this course, you'll learn about Agile software development, cloud management, cloud identity and access management, the cloud physical infrastructure, the cloud logical infrastructure, and cloud privacy. Next, you'll examine the available cloud deployment models such as public, private, hybrid, community, and virtual public clouds, as well as multi-cloud and multitenancy environments. You'll then move on to explore cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service. Finally, you'll learn about advanced topics such the Internet of Things.
14 videos |
1h 18m
Assessment
Badge
Ethical, Privacy, & Intellectual Property Considerations for ChatGPT
In the spirit of exploring the exciting possibilities of generative AI, this course was built using several AI technologies alongside Skillsoft's trusted design methodologies. Generative AI was used to draft the curriculum plan and on-screen text, while AI text-to-speech services were used for narration. In addition, generative AI was used to produce the course assessment and AI assistive technologies helped translate the course captions into multiple languages. In this course, we will define ethical AI and explore the ethical considerations and challenges surrounding advanced AI models. Next, we will examine the potential consequences of using AI and ChatGPT, the impact on society and culture, and the importance of transparency and accountability. Then we will investigate the impact of AI models on privacy and security, the ethical considerations for developing and deploying AI models, and the importance of understanding the risks involved in sharing sensitive intellectual property. Finally, we will discover the roles of government, industry, and society in regulating AI models and how to protect company data.
14 videos |
35m
Assessment
Badge
Azure AI Fundamentals: Artificial Intelligence & Machine Learning
Artificial Intelligence and machine learning in particular are solving a significant number of business and social problems and giving computers a new way to handle and process vast amounts of data. In this course, you'll learn about AI and machine learning concepts regarding regression, classification, and clustering algorithms. You'll explore how to manage datasets and work with labeled versus unlabeled data. You'll learn how supervised and unsupervised machine learning can be used, as well as how to build and use AIs safely, transparently, and fairly. This course is one of a collection that prepares learners for the Microsoft Azure AI Fundamentals (AI-900) exam.
18 videos |
1h 43m
Assessment
Badge
Azure AI Fundamentals: Evaluating Models with the ML Designer
In order to build a powerful and useful machine learning deployment, you must be able to evaluate and verify the AI model and data, as well as the accuracy and effectiveness of its predictions. Azure Machine Learning Studio and the Designer provide multiple easy-to-use methods for evaluating and scoring a model. In this course, you'll learn how to score and evaluate models and interpret and evaluate the results from some common models. You'll also explore how to create an inference pipeline, add web service output to provide external access to the model, and deploy and test a predictive web service. This course is one of a collection that prepares learners for the Microsoft Azure AI Fundamentals (AI-900) exam.
16 videos |
2h 2m
Assessment
Badge
Azure AI Fundamentals: Conversational AI Bot
Conversational bots are becoming a powerful tool for businesses since they can interact and respond to queries and questions similar to how a real person would. However, they are not limited to this use and can also become personal digital assistants and be used as knowledgebases. In this course, you'll learn about the QnA Maker for knowledgebase bots, how to create a conversational bot, how to connect the bot to external channels and apps, and even how to create a simple personal digital assistant. This course is one of a collection that prepares learners for the Microsoft Azure AI Fundamentals (AI-900) exam.
17 videos |
2h 1m
Assessment
Badge
Defining Cloud Computing for Decision-makers: Cloud Computing Principles
The cloud has various deployment and service models that can help an organization design their very own cloud strategy based on their needs. In this course, you'll learn about components of cloud computing including storage, compute, data management, monitoring, code management, and process and deployment management. Investigate cloud deployment models (public, private, hybrid, and community) and serverless architectures such as Backend as a Service (BaaS) and Function as a Service (FaaS). Explore cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service and discover common use cases for each. Finally, learn about cloud deployment architectures and security considerations including lack of control, data breaches, and compliance. After course completion, you'll be able to recognize cloud deployment and service models and key cloud security considerations.
15 videos |
1h 40m
Assessment
Badge
CompTIA A+ Core 1: Cloud Computing Concepts
Cloud computing allows users to store and access data and programs over the internet instead of a local hard drive. In this course, explore cloud computing concepts such as cloud model types, resource sharing, measure service, and virtual desktops. Discover the features of Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS); and learn how to differentiate between public, private, hybrid, and community cloud infrastructures. Discover key differences between internal and external shared resources and explore rapid elasticity, a feature that allows for scalable provisioning. Finally, examine the considerations and benefits of using a measured service or a metered service and investigate the types of virtual desktops and their purposes. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
11 videos |
1h 17m
Assessment
Badge
CompTIA A+ Core 1: Troubleshooting & Resolving Printer Issues
Printers have a lot of moving parts, so problems are inevitable. As a computer technician, your job will be to identify and resolve some of these common concerns. Start by exploring basic troubleshooting considerations for printers, including typical issues like paper jams or print quality problems. Investigate potential driver compatibility issues and learn how to interpret error codes. Find out why firmware updates are required and how they can resolve certain issues. Learn how to correct screen display and printer output problems, how to calibrate and clean printers, and how to troubleshoot print quality issues. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
14 videos |
1h 20m
Assessment
Badge
CompTIA IT Fundamentals: CIA Triad
Computer data is created at a rate that we can barely comprehend. Much of that information is immensely useful and readily available to anyone, but there is a large contingent of information that is and should remain confidential. In this course, you will explore the CIA triad, beginning with the principle of least privilege and concerns surrounding confidentiality, integrity, and availability. Then you will learn about methods for protecting information, including antivirus and antimalware software, firewalls, password security, and safe browsing. Finally, you will discover the importance of patching and updates, best practices for device security, and removing unwanted software. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
17 videos |
1h 43m
Assessment
Badge
Cloud Data Platforms: Cloud Computing
Cloud computing has revolutionized the way we build, deploy, and maintain applications. Due to this paradigm shift, many businesses now rent rather than own IT infrastructure. This new way of approaching infrastructure requirements has given way to multiple cloud computing models, such as Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Function as a Service (FaaS). Knowing what your options are for cloud computing can help you choose the best models for your needs. Use this course to gain a solid foundational understanding of cloud computing. Compare various cloud service providers based on services, available tools, and pricing. Learn about real-life use cases for cloud computing and how businesses can benefit from this ever-evolving technological feat. When you've completed this course, your newfound knowledge of cloud computing will help you decide how it can help your business.
12 videos |
46m
Assessment
Badge
DevOps Platforms and Operations: AIOps & MLOps Basics
MLOps is used to scale and govern machine learning operations, while AIOps provides a way to solve business problems and reduce incident management overhead using AI. In this course, you'll begin with an introduction to what AIOps is and which common IT operations it can be applied to. Discover AIOps capabilities, main business areas which AIOps can be incorporated into, and the benefits to an organization considering adoption. Next, explore various business use cases suitable for AIOps and adoption from a business and technical perspective. Moving on, look at the capabilities provided by MLOps and the benefits of MLOps to a data scientist. Next, explore the steps involved in implementing MLOps including the tools, challenges, and best practices involved. Upon completion of this course, you'll be able to identify the differences between AIOps, MLOps, and DevOps.
14 videos |
1h 25m
Assessment
Badge
Security Principles for DevSecOps
Computer systems and the Internet have changed the way the world does everyday activities. These innovations allow people and businesses to be more connected and accessible than ever before. However, as the Internet evolved, so did Internet security threats, including the sophistication of Internet scams and attacks. In this course, you will explore the history of computer systems and the Internet and discover the basic tenants of information security: confidentiality, integrity, and availability. You will discover different types of information security including application, cloud, and infrastructure security and explore information security risks including advanced persistent threats, insider threats, and ransomware. You will also learn to differentiate between InfoSec, cybersecurity, and DevSecOps. Finally, you will explore common benefits of DevSecOps, including delivery and security.
15 videos |
2h 14m
Assessment
Badge
MLOps with MLflow: Getting Started
MLflow plays a crucial role in systemizing the machine learning (ML) workflow by providing a unified platform that seamlessly integrates different stages of the ML life cycle. In the course, you will delve into the theoretical aspects of the end-to-end machine learning workflow, covering data preprocessing and visualization. You will learn the importance of data cleaning and feature engineering to prepare datasets for model training. You will explore the MLflow platform that streamlines experiment tracking, model versioning, and deployment management, aiding in better collaboration and model reproducibility. Next, you will explore MLflow's core components, understanding their significance in data science and model deployment. You'll dive into the Model Registry that enables organized model versioning and explore MLflow Tracking as a powerful tool for logging and visualizing experiment metrics and model performance. Finally, you'll focus on practical aspects, including setting up MLflow in a virtual environment, understanding the user interface, and integrating MLflow capabilities into Jupyter notebooks.
13 videos |
1h 27m
Assessment
Badge
Getting Started with MLOps
MLOps is the integration of machine learning (ML) with DevOps, focusing on streamlining the end-to-end machine learning life cycle. It emphasizes collaboration, automation, and reproducibility to deliver reliable and scalable machine learning solutions. By implementing MLOps practices, organizations can efficiently manage and govern their machine learning workflows, leading to faster development cycles, better model performance, and enhanced collaboration among data scientists and engineers. In this course, you will delve into the theoretical aspects of MLOps and understand what sets it apart from traditional software development. You will explore the factors that affect ML models in production and gain insights into the challenges and considerations of deploying machine learning solutions. Next, you will see how the Machine Learning Canvas can help you understand the components of ML development. You will then explore the end-to-end machine learning workflow, covering stages from data preparation to model deployment. Finally, you will look at the different stages in MLOps maturity in your organization, levels 0, 1, and 2. You will learn how organizations evolve in their MLOps journey and the key characteristics of each maturity level.
11 videos |
1h 27m
Assessment
Badge
Project Evaluation: Defining Success Metrics
Effective metrics play an important role in ensuring the success of a software project. In this 13-video course, learners will discover how metrics are used to evaluate projects and explore various types of Agile metrics including Lean, Kanban, and Scrum. Begin by examining the importance of the tasks performed by a project analyst in ensuring project success. This leads into an overview of metrics as a measurement tool to evaluate performance. Learn the essentials for project metrics; various types of Agile metrics, and the Agile metrics that are commonly used to evaluate Agile projects. Learners observe how to decide the right metric, qualities that make a metric powerful; recognize details required to define a metric; and how to set benchmarks for effective metrics. Next, learn how to recognize the correct way to evaluate projects by using metrics, and discover best ways to present information gathered using metrics. The final tutorial covers reviewing and improving metrics, or the need to reassess effectiveness of a metric as a criterion for success.
13 videos |
40m
Assessment
Badge
PMI PDU
Information Security for Leaders: An Introduction to InfoSec
Information security, often called InfoSec, consists of tools and processes used to protect data and sensitive information from threats and attacks. In this course, explore the history of information security and discover how to differentiate between cybersecurity and information security. Discover common myths and misconceptions about information security and learn about types of information security, such as infrastructure, cloud, application, and incident response. Next, you will explore security threats, including social media attacks, social engineering, malware, and misconfigurations, and common information security and data protection laws. Finally, you will investigate the responsibilities of a Chief Information Security Officer (CISO), including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance. Upon completion, you'll be able to recognize the importance of information security and the key roles and responsibilities required to protect an organization
15 videos |
1h 18m
Assessment
Badge
Managing Enterprise InfoSec Risks & Risk Tolerance
IT security risks can be defined as a combination of the consequences of an event and the associated likelihood of occurrence. They can be managed by an organization through asset-safeguarding strategies. Through this course, learn about managing enterprise information security (InfoSec) risk and risk tolerance. Explore the definition of risk, how it differs from threats and vulnerabilities, and the history of information security. Next, discover common threats to IT systems and data, how to identify and manage security risks, and the key differences between quantitative and qualitative risk analysis. Finally, learn about common risk assessment tools and the differences between penetration testing and vulnerability assessments. Upon completion, you'll be able to outline and manage IT security risks.
15 videos |
1h 44m
Assessment
Badge
Information Security Practices: Multi-year InfoSec Planning
There is no easy way to predict the future of information security. There are however strategies leaders can implement to better plan and prepare for future growth, security, and threats. In this course, examine potential information security threats, how complexity makes them challenging to predict and plan for, and the threats that ransomware, cybercrime, and the growing crime-as-a-service (CaaS) community pose. Next, discover how work shortages and voids created by skills gaps can cause major issues and the impact of recent global pandemics. Finally, explore operational technology, application container risks, and the evolving risks posed by artificial intelligence and machine learning. Upon completion, you'll be able to plan for the future as an InfoSec leader.
15 videos |
1h 17m
Assessment
Badge
Cybersecurity Awareness: Getting Started with Security Foundations
As organizations become more reliant on IT systems to store all kinds of information, facilitate communication among colleagues and customers, and track business-related statistics, information is becoming more precious and its security increasingly crucial and challenging In this course, you'll explore standard information security concepts and the security-related roles within an organization. You'll examine where various security-related responsibilities fall throughout the organization and the importance of solid strategic planning and decision-making when implementing proper information security. You will also investigate the concept of security governance and the activities involved. Finally, you'll delve into the relationship between an organization's overall business objectives and how information security can promote these.
12 videos |
1h 14m
Assessment
Badge
Cybersecurity Awareness: Information Security Fundamentals
With information security a key concern for organizations, it is important to understand the basic concepts of information security and the security concepts that fall within this topic, such as those within the world of cybersecurity. In this course, you'll recall information security fundamentals before examining the broad domains within it. You'll then delve into cybersecurity and explore the various approaches to it. In addition, you'll examine some practical cybersecurity concepts, such as the CIA triad and the security architecture principle. You'll then investigate the actions that expose us to security risks, the roles we play in maintaining or breaching security, and the various security controls that can be implemented to mitigate security-related risks
16 videos |
1h 54m
Assessment
Badge
Cybersecurity Awareness: Key Security Terms & Concepts
Everyone who connects to the Internet is vulnerable to security threats. Managers need to know the types of security threats their organizations are vulnerable to and their potential impact. In this course, you'll explore the key terms used in cybersecurity. You'll examine different types of threats, threat actors, and targets. You'll investigate advanced persistent threats (APTs), insider threats, and uncertainty in relation to cybersecurity, as well as the various types of malware and security threats
17 videos |
2h 20m
Assessment
Badge
Cybersecurity Awareness: Exposure to Security Risks
There are security issues everywhere. Managers must keep abreast of security risks and threats. In this course, you'll identify standard security risks and their origins. You'll also learn about more diverse types of security issues and the potential threats to an organization's security. You'll be given examples from daily life that expose us to security risks. To wrap up, you'll outline effective methods to reduce common security risks that render organizations vulnerable via different channels.
11 videos |
1h 38m
Assessment
Badge
Cloud Security Fundamentals: Basics of Cloud Operations
Learners can build a foundation for upcoming cloud security topics by exploring cloud definitions, roles, deployment models, characteristics, and building block technologies in this 9-video course. In the first tutorial, you will learn what cloud computing is, its definitions, and roles. You will then examine the characteristics of key cloud computing models, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (Paas). Learners next take a look at the building blocks of what makes cloud computing tick, which is virtualization technology. Following on from this, you will explore compute building block technologies; storage building block technologies, and networking building block technologies. You will also need to be aware of the different database building block technologies offered by your cloud provider. In the final tutorial in this course, learners will compare common public cloud solution provider (CSP) product offerings. In the concluding exercise, you will need to list four advantages of cloud computing, four common software as a service solutions, and four database building block technologies.
10 videos |
54m
Assessment
Badge
Pen Testing Awareness: Results Management
This 14-video course explores benefits to an organization and the role of penetration testing to protect digital assets and networks. In this course, learners observe how to manage and analyze testing results. You will examine several testing methods, including black box, white box, and grey box testing. Next, you will learn about rules of engagement documents, which is executed prior to starting the penetrations testing. This document outlines rules around the test, and the importance of setting stopping points within a penetration test, and when to stop a penetration test. Explore test findings management, risk, risk tolerance, and how to align recommendations to an organization's needs and goals. You will learn about risk tolerance from a privacy and intellectual property perspective, and how to create good test reports for clients. You will learn to categorize your findings by using CVE (Common Vulnerabilities and Exposure) database, or the CVE details. Finally, you will learn how to communicate needed changes, and to emphasize the importance of further testing after recommendations are implemented.
14 videos |
1h 27m
Assessment
Badge
Certified in Cybersecurity (CC): Core Security Principles & Risk Management
It is of high importance that organizations operate upon a solid foundation of security principles, concepts, and risk management. It is impossible to reduce security risk until core security and risk management principles are defined. In this course, explore the elements of the confidentiality, integrity, and availability (CIA) triad, along with the essentials of authentication and using non-repudiation services. Next, examine what risk is and the terminology surrounding risk management, threats, and vulnerability. Finally, learn about risk assessment, identification, and treatment and compare qualitative and quantitative risk analysis. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos |
32m
Assessment
Badge
Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
Security governance is a huge part of overall corporate or organizational governance. The security practitioner must be aware of various governance elements, regulations, laws, standards, policies, and procedures. Begin this course by exploring the elements of governance, including mission charter, leadership, and corporate guidance. Then investigate various laws and regulations like General Data Protection Regulation (GDPR) and HIPAA, standards issued by the International Organization for Standardization and International Electrotechnical Commission (ISO/IEC), and the National Institute of Standards and Technology (NIST), and common policies and standard operating procedures. Next, examine the International Information System Security Certification Consortium (ISC2) code of ethics. Finally, discover security control categories and types. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
25m
Assessment
Badge
Certified in Cybersecurity (CC): Business Continuity Planning
Many organizations nowadays have become aware of the need for business continuity planning, also known as continuity of operations. The main objective of a business continuity plan (BCP) is for an organization to maintain organizational operations while recovering from a major interruption. In this course, explore the importance and goals of business continuity and continuity of operations, as well as the components of a business continuity plan. Next, learn about business impact analysis (BIA), backup and restore policies, and disaster recovery plans. Finally, investigate the various tests and drills that incident response and business continuity plans should be subjected to. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
30m
Assessment
Badge
Certified in Cybersecurity (CC): Networking & Security Infrastructure
Although new security practitioners can come from development, database, or other backgrounds, the majority of security professionals come from a networking background. It is virtually impossible to separate networking knowledge from security expertise. Begin this course by exploring network types, network devices, and device addressing mechanisms. Then you will discover the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) reference models, logical ports, and the TCP handshake. Next, you will focus on transport layer security (TLS) and IP security (IPsec). Finally, you will examine virtual LANs (VLANs) and Wi-Fi fundamentals. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
12 videos |
45m
Assessment
Badge
Secure Programmer: Intro to Programming Standards
In this course, learners can explore various IEEE programming standards, software requirement types, and requirements gathering techniques. Discover how software quality is defined and steps to take in the change management process. Begin this 10-video course with an introduction to basic programming and software engineering concepts. Then move on to a three-part tutorial on programming standards-part A on recalling IEEE programming standards including general, testing and quality, and maintenance and documentation standards; part B on IEEE standards, including NIST SP 800-27, ISO/IEC 15504 and 24744:2014, and ISO 29110; and part C on recalling IEEE and ISO programming standards. This leads into identifying software requirement types, the functionality, usability, reliability, performance, and supportability (FURPS) model, and the requirements gathering techniques. Next, you will explore requirements gathering techniques such as brainstorming, interviews, focus groups, and reverse engineering, and examine quality and the change management process. In the final tutorial, learners observe how to apply the IEEE Std 730 standard for software quality.
10 videos |
55m
Assessment
Badge
Secure Programmer: Software Testing
Explore key aspects of software testing, software validation, and bug tracking methods in this 14-video course, beginning with a look at very specific testing methodologies, and an in-depth introduction into how to do testing. This leads learners into observing how to apply unit testing; integration testing; regression testing, and user acceptance testing. Another tutorial will explore the roles and responsibilities in testing, or who in one's team is responsible for what aspect of testing. You will also learn about specific testing methods, and how to do the individual test, regardless of what type it is. Following on from this, learners will examine test cases and reporting, where formalized testing requires some level of reporting and specific test cases. Then discover how to apply software metrics and explore software verification and software validation. To complete the course, you will learn about the concepts of bug tracking and how to use various bug tracking methods.
14 videos |
1h 11m
Assessment
Badge
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Rating 5.0 of 1 users
(1)