Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
In this course, you will walk through the services used to create an AI solution in Azure and the requirements to secure the solution, including data security and deployment security of Machine Learning models and Cognitive Services.
Learn what it takes to secure your newly developed and/or deployed AI solution in Microsoft Azure. In this course, Identifying Security Requirements of an AI solution, you will learn foundational knowledge to secure your AI Solution no matter whether you are leveraging Azure Cognitive Services or custom machine learning models. First, you will discover how to leverage Azure Cognitive Services in a secure authenticated way. Next, you will learn what security options are available for any test data that you need to train the models of both Cognitive Services and machine learning models. Finally, you will explore how to secure the deployment of an AI solution using machine learning models. When you are finished with this course, you will have the skills and knowledge of security options within Azure Services needed to secure an AI solution from development to deployment.
Learn what it takes to secure your newly developed and/or deployed AI solution in Microsoft Azure. In this course, Identifying Security Requirements of an AI solution, you will learn foundational knowledge to secure your AI Solution no matter whether you are leveraging Azure Cognitive Services or custom machine learning models. First, you will discover how to leverage Azure Cognitive Services in a secure authenticated way. Next, you will learn what security options are available for any test data that you need to train the models of both Cognitive Services and machine learning models. Finally, you will explore how to secure the deployment of an AI solution using machine learning models. When you are finished with this course, you will have the skills and knowledge of security options within Azure Services needed to secure an AI solution from development to deployment.