Aspire Journeys

753 AI Adoption Specialist Advanced KSAT Journey

  • 10 Courses | 7h 40m 50s
Facilitates AI adoption by supporting the users of AI-enabled solutions.

753 AI Adoption Specialist Advanced

Facilitates AI adoption by supporting the users of AI-enabled solutions.

  • 10 Courses | 7h 40m 50s

COURSES INCLUDED

AI in Industry
Designing successful and competitive AI products involves thorough research on its existing application in various markets. Most large scale businesses use AI in their workflows to optimize business operations. AI Architects should be aware of all possible applications of AI so they can look at market trends and come up with the most appropriate, novel, and useful AI solutions for their industry. In this course, you'll explore examples of standard AI applications in various industries like Finance, Marketing, Sales, Manufacturing, Transportation, Cybersecurity, Pharmaceutical, and Telecommunications. You'll examine how AI is utilized by leading AI companies within each of these industries. You'll identify which AI technologies are common across all industries and which are industry-specific. Finally, you'll recognize why AI is imperative to the successful operation of many industries.
12 videos | 40m has Assessment available Badge
AI Framework Overview: AI Developer Role
Any aspiring AI developer has to clearly understand the responsibilities and expectations when entering the industry in this role. AI Developers can come from various backgrounds, but there are clear distinctions between this role and others like Software Engineer, ML Engineer, Data Scientist, or AI Engineers. Therefore, any AI Developer candidate has to posses the required knowledge and demonstrate proficiency in certain areas. In this course you will learn about the AI Developer role in the industry and compare the responsibilities of AI Developers with other engineers involved in AI development. After completing the course, you will recognize the mindset required to become a successful AI Developer and become aware of multiple paths for career progression and future opportunities
14 videos | 38m has Assessment available Badge
The AI Practitioner: Optimizing AI Solutions
Optimization is required for any AI model to deliver reliable outcomes in most of the use cases. AI Practitioners use their knowledge of optimization techniques to choose and apply various solutions and improve accuracy of existing models. In this course, you'll learn about advanced optimization techniques for AI Development, including multiple optimization approaches like Gradient Descent, Momentum, Adam, AdaGrad and RMSprop optimization. You'll examine how to determine the preferred optimization technique to use and the overall benefits of optimization in AI. Lastly, you'll have a chance to practice implementing optimization techniques from scratch and applying them to real AI models.
14 videos | 38m has Assessment available Badge
Using Intelligent Information Systems in AI
The world of technology continues to transform at a rapid pace, with intelligent technology incorporated at every stage of the business process. Intelligent information systems (IIS) reduce the need for routine human labor and allow companies to focus instead on hiring creative professionals. In this course, you'll explore the present and future roles of intelligent informational systems in AI development, recognizing the current demand for IIS specialists. You'll list several possible IIS applications and learn about the roles AI and ML play in creating them. Next, you'll identify significant components of IIS and the purpose of these components. You'll examine how you would go about creating a self-driving vehicle using IIS components. Finally, you'll work with Python libraries to build high-level components of a Markov decision process.
15 videos | 51m has Assessment available Badge
CISM 2022: Social Engineering & Malware
Modern day IT device users must have an awareness of the deception by malicious actors through their devices. Recurring security awareness training in an organization is by far the most effective way to minimize realized threats against business assets. In this course, you will explore social engineering in its various forms, focusing on malware types like viruses, trojans, and ransomware. Then you will review various examples of phishing email messages and find out how to detect that they are fraudulent. Next, you will use the Metasploit Framework's Social-Engineer Toolkit (SET) to execute a social engineering attack, discover how botnets work, and learn how their function can be mitigated. You will configure a Microsoft Windows virus and threat protection. Finally, you will upload an infected file to an online service for malware scanning. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
8 videos | 42m has Assessment available Badge
MLOps with Data Version Control: CI/CD Using Continuous Machine Learning
Continuous integration and continuous deployment (CI/CD) are crucial in machine learning operations (MLOps) as they automate the integration of ML models into software development. Continuous machine learning (CML) refers to an ML model's ability to learn continuously from a stream of data. In this course, you will build a complete Data Version Control (DVC) machine learning pipeline in preparation for continuous machine learning. You will modularize your machine learning workflow using DVC pipelines, configure DVC remote storage on Google Drive, and set up authentication for DVC to access Google Drive. Next, you will configure CI/CD through CML and use the open-source CML framework to implement CI/CD within your machine learning project. Finally, you will see how for every git push to your remote repository, a CI/CD pipeline will execute your experiment and generate a CML report with model metrics for every GitHub commit. At the end of this course, you will be able to use DVC's integration with CML to build CI/CD pipelines.
9 videos | 1h 2m has Assessment available Badge
CISA 2022: IT Management Frameworks, Regulations, & Standards
IT management frameworks provide a structured approach to managing and auditing IT assets. Regulations and standards are put in place to ensure that organizations have guidelines to follow for how they deal with information systems. In this course, you will explore IT management frameworks, regulations, and standards, beginning with an overview of IT and data governance, and standards, policies, and procedures. Then you will learn about Control Objectives for Information and Related Technologies (COBIT), IT Infrastructure Library (ITIL), and International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) standards. Next, you will discover risk management and risk treatment. Finally, you will dig into IT maturity models, the Business Model for Information Security (BMIS), the Information Technology Assurance Framework (ITAF), and IT balanced scorecards. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).
16 videos | 1h 28m has Assessment available Badge
CISSP 2024: Professional Ethics & Security Concepts
Regardless of the guidance that one is following as a security professional, one common theme is that architects must be held to a high ethical standard based on their responsibility to manage risk to all assets. In this course, you will explore the International Information System Security Certification Consortium (ISC2) Code of Professional Ethics. Then you will discover organizational codes of ethics, which establish an integral aspect of a mission and model adopted by an organization. Finally, you will focus on the Five Pillars of information security - confidentiality, integrity, availability, authenticity, and non-repudiation. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
9 videos | 18m has Assessment available Badge
CISSP 2024: Risk Management Concepts
Security risk management involves the continual process of identifying security risks and implementing strategy and tactics to mitigate them. It is a vital component of any organization's strategy to protect its assets, ensure regulatory compliance, maintain operational continuity, and safeguard its reputation. Begin this course by exploring threat and vulnerability identification, as well as risk analysis, assessment, and response. Next, you will discover control categories, types, and assessments. Then you will investigate continuous monitoring and measurement and risk management reporting. Finally, you will examine continuous improvement and risk frameworks as you gain the essential skills to protect and secure your organization's critical resources. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
11 videos | 45m has Assessment available Badge
CISSP 2024: Security Audit & Controls Testing
A security audit is a comprehensive assessment of an organization's information systems. Typically, they measure the systems and applications against an audit checklist of industry best practices, externally established standards, and/or federal regulations. In this course, differentiate internal, external, and third-party auditing and learn about locations for auditing and controls testing, the purpose of a vulnerability assessment, and the basics of penetration testing. Next, explore log reviews and log data, code review and testing techniques, and compare synthetic transactions, benchmark, and misuse case testing. Finally, examine coverage analysis concepts, compare interface testing methods, and discover the purpose of compliance checks. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
12 videos | 34m has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.