This Workshop is the first module of the Deep Learning Developer Series and is a prerequisite to the advanced Deep Learning modules. It goes through both the overall concepts and techniques for not only understanding, but building a variety of Deep Learning models for tabular data, image data, audio data and text data.
In this module, we go beyond the basic skills taught in module one such as Convolutional Neural Networks (CNNs). This would expand your ability to build modern image networks using a variety of architectures and for applications beyond simple classification.
This is the last run of the Deep Learning Developer Workshop Series – Don’t miss this chance to learn new AI competencies from leading professionals! In this module, we dive deeper into some of the latest Deep Learning techniques for text and time series applications.
In this module, we dive deeper into some of the latest techniques for using Deep Learning through Unsupervised, Self-Supervised and Reinforcement Learning.
“Machine Learning for Humans” seeks to develop the cognitive capacities of participants, to help them think like a Data Scientist. These include learning to frame problem statements using the lens of Data Science, understanding the data requirements, and designing and selecting the most appropriate Machine Learning models that can be used to address various problem statements. Upon completion of the course, participants will receive a Certificate of Completion issued by Ngee Ann Polytechnic.
Through this three-day workshop, you will gain a deeper understanding of the OT Cybersecurity ecosystem as we touch on concepts like embedded systems, protocols fundamentals, known vulnerabilities discovery, forensic investigation and process exploitation.
This workshop is currently full, we apologise for any inconvenience caused. Please register your interest for the next session with the button below.
Designed for anyone who has little or no prior knowledge in Cybersecurity, this course will equip you and your organisation with defence mechanisms to mitigate the risks of cyber vulnerability; allowing you to react to present and future Cybersecurity challenges.