Free
Course

Enterprise Security: AI in Authentication & Detection of Security Threats

Learn AI in authentication, covering biometrics, vulnerabilities, and behavioral analysis. Explore AI-driven security for user verification through selfies and voice.

  • Skill level

    Intermediate
  • Time to complete

    Approx. 3 hours
  • Certificate of completion

    Yes

About this course

Authentication refers to the process of validating the identity of a registered user or process to ensure a subject is who they claim to be. In this course, you will explore the role of artificial intelligence (AI) in authentication and how it can be leveraged to confirm a user's identity through a selfie, fingerprint, or voice recognition. Discover common authentication vulnerabilities, including SQL injection, username enumeration, and weak login credentials, and investigate how behavioral biometrics can analyze a user's physical and cognitive behavior to determine threats. Learn about other areas to consider when building a secure authentication solution, including anomaly detection, adaptive authentication, voice recognition, and facial recognition. Finally, find out how to detect security threats using AI and examine how AI models can streamline a common authentication process.

Learning objectives

  • Discover the key concepts covered in this course
  • List common authentication vulnerabilities including sql injection, username enumeration, and weak login credentials
  • Describe ai's role in authentication
Meet the creator of the course
William MacDonald
Cybersecurity Expert
William MacDonald has been working in various IT roles for over 15 years. During this time, he has worked on desktop support, enterprise server systems, managed IT and broadcasting departments, and provided hands on cybersecurity training. William holds his PMP, CGEIT, and CISSP certifications as well as technical certifications from Microsoft, VMWare, and Cisco. He has a MBA from Syracuse University and holds an undergrad in business administration.

How it works

Expert-led videos

In this course, you'll watch videos created by industry-leading experts for some of the biggest tech companies in the world. They'll cover key concepts, go through sample applications, prepare you for industry certifications, and more. Watch on any device — whenever and wherever you want — to learn at your own pace.

Reviews from learners

  • Very well put together as usual. I learn so much from each experience with Codecademy. I can't explain how satisfied I am with this institution.
    David W
    Verified Learner
  • Everything Codecademy offers is useful for all software developers.
    Fidan M
    Verified Learner
  • I thought that I would never be able to learn to code but Codecademy has made it very easy. I just love it!
    Adyan H
    Verified Learner

Our learners work at

  • Google Logo
  • Meta Logo
  • Apple Logo
  • EA Logo
  • Amazon Logo
  • IBM Logo
  • Microsoft Logo
  • Reddit Logo
  • Spotify Logo
  • Uber Logo
  • YouTube Logo
  • Instagram Logo

4 In-Demand Cybersecurity Skills That Will Help Get You Hired

Cory Stieg
Aug 14, 2024

There are an estimated 469,930 cybersecurity job openings in the United States — and you might have the skills necessary to fill one of them.

As tech continues to transform our lives, more people are needed to defend these technologies and keep up with their advancements, says Okey Obudulu, Chief Information Security Officer (CISO) for Skillsoft, the company that owns Codecademy. “The blatant attacks on companies’ networks have led more and more companies to really get serious around the demand for cybersecurity professionals,” he says.

Continue reading

Join over 50 million learners and start Enterprise Security: AI in Authentication & Detection of Security Threats today!

Start

Unlock additional features with a paid plan

  • Portfolio projects

    Create professional projects you can share with recruiters to showcase your skills and experience.
  • Job-readiness checker

    Evaluate how well you meet the requirements for any job description based on your skills and experience.
  • Certificate of completion

    Earn a document you can share with your network to prove that you’ve completed this course.