Hands-On Image Recognition: Python Data Science Bootcamp

Course Cover

5

(1)

compare button icon

Course Features

icon

Duration

5 hours

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

5 hours

Course Description

This course was funded by a wildly successful kickstarter. Let's learn how to perform automated image recognition! In this course, you learn how to code in python, calculate linear regression with tensor flow, and perform cifar 10 image data and recognition. We interweave theory with practical examples so that you learn by doing. I is code that mimics certain tasks. You can use I to predict trends like the stock market. Automating tasks has exploded in popularity since tensor flow became available to the public (like you and me! ) I like tensor flow is great for automated tasks including facial recognition. One farmer used the machine model to pick cucumbers! Join mammoth interactive in this course, where we blend theoretical knowledge with hands-on coding projects to teach you everything you need to know as a beginner to credit card fraud detection.

Course Overview

projects-img

Post Course Interactions

projects-img

Hands-On Training,Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

Prerequisites/Requirements

Prerequisites are not available for this course

What You Will Learn

Introduction to ethical hacking, including terminologies, vulnerabilities assessment, penetration testing and various laws related to hacking

What is Kali Linux as well as how to install it

How to crack passwords and different password attacks

Introduction to Network Scanning as well as learning about nmap, Nessus Vulnerability Scanner, and proxy chaining

Introduction to enumeration, and enumeration tools and techniques

Detailed introduction into system hacking and malware threats

Understanding Sniffing, as well as finding and changing MAC address

DOS Attacks, DOS attack mitigation Techniques, Techniques to Flood a network and type of dos attack and dos tools

Course Instructors

Mohamad Mahjoub

Instructor

Cybersecurity expert
Course Cover