Aspire Journeys

902 AI Innovation Leader Advanced KSAT Journey

  • 9 Courses | 6h 29m 36s
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Builds the organization's AI vision and plan and leads policy and doctrine formation including how AI solutions can or will be used.

902 AI Innovation Leader Advanced

Builds the organization’s AI vision and plan and leads policy and doctrine formation including how AI solutions can or will be used.

  • 9 Courses | 6h 29m 36s

COURSES INCLUDED

AI in Industry
Designing successful and competitive AI products involves thorough research on its existing application in various markets. Most large scale businesses use AI in their workflows to optimize business operations. AI Architects should be aware of all possible applications of AI so they can look at market trends and come up with the most appropriate, novel, and useful AI solutions for their industry. In this course, you'll explore examples of standard AI applications in various industries like Finance, Marketing, Sales, Manufacturing, Transportation, Cybersecurity, Pharmaceutical, and Telecommunications. You'll examine how AI is utilized by leading AI companies within each of these industries. You'll identify which AI technologies are common across all industries and which are industry-specific. Finally, you'll recognize why AI is imperative to the successful operation of many industries.
12 videos | 40m has Assessment available Badge
Using Intelligent Information Systems in AI
The world of technology continues to transform at a rapid pace, with intelligent technology incorporated at every stage of the business process. Intelligent information systems (IIS) reduce the need for routine human labor and allow companies to focus instead on hiring creative professionals. In this course, you'll explore the present and future roles of intelligent informational systems in AI development, recognizing the current demand for IIS specialists. You'll list several possible IIS applications and learn about the roles AI and ML play in creating them. Next, you'll identify significant components of IIS and the purpose of these components. You'll examine how you would go about creating a self-driving vehicle using IIS components. Finally, you'll work with Python libraries to build high-level components of a Markov decision process.
15 videos | 51m has Assessment available Badge
AI Framework Overview: AI Developer Role
Any aspiring AI developer has to clearly understand the responsibilities and expectations when entering the industry in this role. AI Developers can come from various backgrounds, but there are clear distinctions between this role and others like Software Engineer, ML Engineer, Data Scientist, or AI Engineers. Therefore, any AI Developer candidate has to posses the required knowledge and demonstrate proficiency in certain areas. In this course you will learn about the AI Developer role in the industry and compare the responsibilities of AI Developers with other engineers involved in AI development. After completing the course, you will recognize the mindset required to become a successful AI Developer and become aware of multiple paths for career progression and future opportunities
14 videos | 38m has Assessment available Badge
The AI Practitioner: Optimizing AI Solutions
Optimization is required for any AI model to deliver reliable outcomes in most of the use cases. AI Practitioners use their knowledge of optimization techniques to choose and apply various solutions and improve accuracy of existing models. In this course, you'll learn about advanced optimization techniques for AI Development, including multiple optimization approaches like Gradient Descent, Momentum, Adam, AdaGrad and RMSprop optimization. You'll examine how to determine the preferred optimization technique to use and the overall benefits of optimization in AI. Lastly, you'll have a chance to practice implementing optimization techniques from scratch and applying them to real AI models.
14 videos | 38m has Assessment available Badge
CISA 2022: Data Privacy
Any IT environment requires a firm understanding of data privacy. Privacy laws and regulations, combined with industry practices, form the basis for effective information protection. In this course, you'll explore data privacy, beginning with the CIA Triad, personally identifiable information (PII), and Protected Health Information (PHI). You will learn about the General Data Protection Regulation (GDPR), Payment Card Industry Data Security Standard (PCI DSS), compliance with GDPR and PCI DSS, the Health Insurance Portability and Accountability Act (HIPAA), and Federal Risk and Authorization Management Program (FedRAMP). Finally, you'll dig into assets and risks, annualized loss expectancy (ALE), and network inventories. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).
14 videos | 1h 22m has Assessment available Badge
CISSP 2024: Professional Ethics & Security Concepts
Regardless of the guidance that one is following as a security professional, one common theme is that architects must be held to a high ethical standard based on their responsibility to manage risk to all assets. In this course, you will explore the International Information System Security Certification Consortium (ISC2) Code of Professional Ethics. Then you will discover organizational codes of ethics, which establish an integral aspect of a mission and model adopted by an organization. Finally, you will focus on the Five Pillars of information security - confidentiality, integrity, availability, authenticity, and non-repudiation. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
9 videos | 18m has Assessment available Badge
CISSP 2024: Security Governance & Compliance Issues
Security governance is the set of practices exercised by executive management to offer strategic direction, ensuring that objectives are achieved, determining that risks are managed properly, and verifying that the organizations' resources are used responsibly. Begin this course by discovering how to align security governance with organizational goals and objectives. Then you will explore organizational processes like acquisitions, divestitures, and governance committees, as well as organizational roles and responsibilities. You will investigate security control frameworks like including the International Organization for Standardization (ISO), the National Institute of Standards and Technology (NIST) and learn about due diligence, due care, cybercrimes, and data breaches. Next, you will examine licensing and intellectual property requirements, import and export controls, transborder data flow, and privacy-related issues. Finally, you will focus on contractual, legal, industry standards and regulatory requirements. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
12 videos | 42m has Assessment available Badge
CISSP 2024: Investigations & Policies
Cybercrime investigation is a critical practice in a modern security landscape. In this field, skilled security professionals from agencies like the FBI use digital forensics to track, analyze, and dismantle various types of cybercrime and cyber threats. This course covers several CISSP exam objectives. You will begin by exploring the requirements for administrative, criminal, civil, regulatory, and industry investigations. You will then learn to develop, document, and implement security policy, standards, procedures, and guidelines. Finally, you will discover considerations for the enforcement of personnel security policies and procedures. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
7 videos | 32m has Assessment available Badge
CISSP 2024: Risk Management Concepts
Security risk management involves the continual process of identifying security risks and implementing strategy and tactics to mitigate them. It is a vital component of any organization's strategy to protect its assets, ensure regulatory compliance, maintain operational continuity, and safeguard its reputation. Begin this course by exploring threat and vulnerability identification, as well as risk analysis, assessment, and response. Next, you will discover control categories, types, and assessments. Then you will investigate continuous monitoring and measurement and risk management reporting. Finally, you will examine continuous improvement and risk frameworks as you gain the essential skills to protect and secure your organization's critical resources. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
11 videos | 45m has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE