CompTIA SecAI+ CY0-001
Course Content
AI Types and Techniques Used in Cybersecurity
Importance of data security in relation to AI
Importance of AI Security
AI Threat-Modeling Scenarios
Introduction to CompTIA SecAI+ Certification Exam
You don't currently have access to this content
Types of AI
You don't currently have access to this content
Model Training Techniques
You don't currently have access to this content
Prompt Engineering
You don't currently have access to this content
Data Processing
You don't currently have access to this content
Data Types
You don't currently have access to this content
Watermarking
You don't currently have access to this content
Retrieval-Augmented Generation (RAG)
You don't currently have access to this content
Business Use Case
You don't currently have access to this content
Data Collection
You don't currently have access to this content
Data Preparation
You don't currently have access to this content
Model Development/Selection
You don't currently have access to this content
Model Evaluation
You don't currently have access to this content
Deployment
You don't currently have access to this content
Validation
You don't currently have access to this content
Monitoring and Maintenance
You don't currently have access to this content
Feedback and Iteration
You don't currently have access to this content
Human-Centric AI Design Principles
You don't currently have access to this content
Open Worldwide Application Security Project (OWASP) Top 10
You don't currently have access to this content
Massachusetts Institute of Technology (MIT) AI Risk Repository
You don't currently have access to this content
