<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="33194" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/cydrill-mlsec-p" lastchanged="2025-10-22T15:43:09+02:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Machine learning security (Python)</title><productcode>MLSEC-P</productcode><vendorcode>CY</vendorcode><vendorname>Cydrill</vendorname><fullproductcode>CY-MLSEC-P</fullproductcode><version>1.0</version><objective>&lt;ul&gt;
&lt;li&gt;Getting familiar with essential cyber security concepts&lt;/li&gt;&lt;li&gt;Learning about various aspects of machine learning security&lt;/li&gt;&lt;li&gt;Attacks and defense techniques in adversarial machine learning&lt;/li&gt;&lt;li&gt;Input validation approaches and principles&lt;/li&gt;&lt;li&gt;Identify vulnerabilities and their consequences&lt;/li&gt;&lt;li&gt;Learn the security best practices in Python&lt;/li&gt;&lt;li&gt;Managing vulnerabilities in third party components&lt;/li&gt;&lt;li&gt;Understanding how cryptography supports security&lt;/li&gt;&lt;li&gt;Learning how to use cryptographic APIs correctly in Python&lt;/li&gt;&lt;/ul&gt;</objective><audience>&lt;p&gt;Python developers working on machine learning systems&lt;/p&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Cyber security basics&lt;/li&gt;&lt;li&gt;Machine learning security&lt;/li&gt;&lt;li&gt;Input validation&lt;/li&gt;&lt;li&gt;Security features&lt;/li&gt;&lt;li&gt;Time and state&lt;/li&gt;&lt;li&gt;Errors&lt;/li&gt;&lt;li&gt;Using vulnerable components&lt;/li&gt;&lt;li&gt;Cryptography for developers&lt;/li&gt;&lt;li&gt;Wrap up&lt;/li&gt;&lt;/ul&gt;</contents><objective_plain>- Getting familiar with essential cyber security concepts
- Learning about various aspects of machine learning security
- Attacks and defense techniques in adversarial machine learning
- Input validation approaches and principles
- Identify vulnerabilities and their consequences
- Learn the security best practices in Python
- Managing vulnerabilities in third party components
- Understanding how cryptography supports security
- Learning how to use cryptographic APIs correctly in Python</objective_plain><audience_plain>Python developers working on machine learning systems</audience_plain><contents_plain>- Cyber security basics
- Machine learning security
- Input validation
- Security features
- Time and state
- Errors
- Using vulnerable components
- Cryptography for developers
- Wrap up</contents_plain><duration unit="d" days="4">4 jours</duration><pricelist><price country="DE" currency="EUR">3000.00</price><price country="AT" currency="EUR">3000.00</price><price country="SI" currency="EUR">3000.00</price><price country="CH" currency="CHF">3000.00</price></pricelist><miles/></course>