certifications-training
Professional certifications, CTF competitions, and training resources for AI security practitioners
adversarial-training
Defensive techniques using adversarial examples to improve model robustness and security
adversarial-examples
Generate adversarial inputs, edge cases, and boundary test payloads for stress-testing LLM robustness
model-extraction
Techniques to extract model weights, architecture, and training data through API queries
benchmark-datasets
Standard datasets and benchmarks for evaluating AI security, robustness, and safety
rag-exploitation
Attack techniques for Retrieval-Augmented Generation systems including knowledge base poisoning
automated-testing
CI/CD integration and automation frameworks for continuous AI security testing
data-poisoning
Test AI training pipelines for data poisoning vulnerabilities and backdoor injection
infrastructure-security
Securing AI/ML infrastructure including model storage, API endpoints, and compute resources
red-team-frameworks
Tools and frameworks for AI red teaming including PyRIT, garak, Counterfit, and custom attack automation
prompt-injection-testing
Master prompt injection attacks, jailbreak techniques, input manipulation, and payload crafting for LLM security testing
prompt-hacking
Advanced prompt manipulation including direct attacks, indirect injection, and multi-turn exploitation
defense-implementation
Implement mitigations, create input filters, design output guards, and build defensive prompting for LLM security
red-team-reporting
Professional security report generation, executive summaries, finding documentation, and remediation tracking
responsible-disclosure
Ethical vulnerability reporting, coordinated disclosure, and bug bounty participation for AI systems
safety-filter-bypass
Techniques to test and bypass AI safety filters, content moderation systems, and guardrails for security assessment
secure-deployment
Security best practices for deploying AI/ML models to production environments
security-testing
Comprehensive security testing automation for AI/ML systems with CI/CD integration
model-inversion
Privacy attacks to extract training data and sensitive information from AI models
input-output-guardrails
Implementing safety filters, content moderation, and guardrails for AI system inputs and outputs
testing-methodologies
Structured approaches for AI security testing including threat modeling, penetration testing, and red team operations
code-injection
Test AI systems for code injection vulnerabilities including prompt-to-code attacks and agent exploitation
vulnerability-discovery
Systematic vulnerability finding, threat modeling, and attack surface analysis for AI/LLM security assessments
llm-jailbreaking
Advanced LLM jailbreaking techniques, safety mechanism bypass strategies, and constraint circumvention methods
continuous-monitoring
Real-time monitoring and detection of adversarial attacks and model drift in production
ui
XML layouts, ConstraintLayout, Jetpack Compose, Material Design 3.
production
Unit testing, performance optimization, security implementation, Play Store deployment.
networking
Retrofit, OkHttp, REST APIs, JSON serialization, network security.
architecture
MVVM pattern, Clean Architecture, Repository pattern, dependency injection, SOLID principles.
data
Room ORM, SQLite, SharedPreferences, DataStore, encryption.
fundamentals
Master Kotlin syntax, OOP principles, SOLID practices, functional programming, and data structures.
platform
Android core components lifecycle, Activities, Fragments, Services, Intent system.
devops
Deploy applications with Docker and Kubernetes, automate with CI/CD, manage infrastructure with code, and configure cloud platforms and networking.
messaging
Message queues and event-driven backend architecture. RabbitMQ, Kafka, pub/sub patterns, and async communication.
performance
Optimize application performance through caching strategies, load balancing, database scaling, and monitoring. Build systems handling thousands of concurrent users.
microservices
Microservices architecture patterns and best practices. Service decomposition, inter-service communication, and distributed data management.
authentication
Backend authentication and authorization patterns. JWT, OAuth2, session management, RBAC, and secure token handling.
languages
Master programming languages for backend development. Learn language selection, fundamentals, and ecosystem for JavaScript, Python, Go, Java, C#, PHP, Ruby, and Rust.
databases
Master relational and NoSQL databases. Learn PostgreSQL, MySQL, MongoDB, Redis, and other technologies for data persistence, optimization, and scaling.
observability
Logging, metrics, and distributed tracing. OpenTelemetry, Prometheus, Grafana, and production debugging.
api-design
Design and build professional APIs with REST, GraphQL, and gRPC. Master authentication, documentation, testing, and operational concerns.
architecture
Master architectural design with SOLID principles, design patterns, microservices, and event-driven systems. Learn to design scalable backend systems.
security
Secure backend applications against OWASP threats. Implement authentication, encryption, scanning, compliance, and incident response procedures.
testing
Backend testing strategies and test automation. Unit, integration, E2E, and load testing with best practices.
visualization
Data visualization design, tools, and storytelling for impactful analytics presentations
statistics
Statistical analysis methods, hypothesis testing, and probability for data analytics
python-analytics
Python data analysis with pandas, numpy, and analytics libraries
advanced-analytics
Advanced analytics including machine learning, predictive modeling, and big data techniques
business-intelligence
BI tools, dashboards, and enterprise analytics platforms
career-development
Data analyst career development, portfolio building, and professional growth strategies
Page 1172 of 1285 · 64207 results
