We may earn an affiliate commission when you visit our partners.
DevSecCon

Join security advocate Alyssa Miller, journalist J.M. Porup, and privacy & patient rights advocate Andrea Downing for this open conversation about deep fakes.

Read more

Join security advocate Alyssa Miller, journalist J.M. Porup, and privacy & patient rights advocate Andrea Downing for this open conversation about deep fakes.

Join security advocate Alyssa Miller, journalist J.M. Porup, and privacy & patient rights advocate Andrea Downing for this open conversation about deep fakes. They'll talk about the technology behind deep fakes, including research developments, the potential ethical and privacy concerns, and even analyze how much of a threat deep fakes actually are to political, business, and social interactions.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Fireside Chat: Reality Check on Deep Fakes

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Hosted by security advocate Alyssa Miller and moderated by journalist J.M. Porup, and joined by privacy & patient rights advocate Andrea Downing, this course is led by recognized experts in the field
Aimed at the general audience, this course is accessible to beginners to learn about the potential threats deep fakes pose to current events and everyday life

Save this course

Save Fireside Chat: Reality Check on Deep Fakes to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Fireside Chat: Reality Check on Deep Fakes with these activities:
Review AI related articles
Start with AI basics before taking advanced courses.
Browse courses on AI
Show steps
  • Read articles from journals to learn about existing applications of AI
  • Review news articles to identify emerging trends in AI
Create a simple deepfake video
Applying deep learning techniques can enhance understanding of course concepts.
Show steps
  • Learn about the process of creating deepfake videos, from data collection to training and generation
  • Create a dataset of images and videos of a target person
  • Use a deep learning framework to train a model to generate realistic deepfake videos
Discuss ethical implications of deepfakes
Peer discussions help clarify complex concepts and cultivate different perspectives
Browse courses on Ethics
Show steps
  • Research the ethical concerns surrounding deepfakes, such as their potential for misuse in political campaigns or harassment
  • Participate in a peer-led discussion group to share and debate ideas about the ethical implications of deepfakes
One other activity
Expand to see all activities and additional details
Show all four activities
Write a paper on the history of deepfakes
Research and writing deepens understanding of deepfake technology and its evolution.
Show steps
  • Gather information from reliable sources about the development and evolution of deepfake technology
  • Organize the information into a coherent narrative, highlighting key milestones and advancements
  • Write a well-structured paper that presents a comprehensive overview of the history of deepfakes

Career center

Learners who complete Fireside Chat: Reality Check on Deep Fakes will develop knowledge and skills that may be useful to these careers:
Privacy and Patient Rights Advocate
Privacy and Patient Rights Advocates help to ensure that people's privacy rights are protected. They may work in a variety of settings, such as healthcare, law enforcement, or government. This course can help build a foundation for a career as a Privacy and Patient Rights Advocate by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Security Analyst
Security Analysts assess an organization's security, identify vulnerabilities, and make recommendations to help protect the organization's data and systems. This course can help build a foundation for a career in Security Analysis by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Forensic Analyst
Forensic Analysts investigate and analyze digital evidence to help law enforcement and other agencies solve crimes. They may specialize in a particular area, such as computer forensics or digital forensics. This course can help build a foundation for a career as a Forensic Analyst by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Information Security Analyst
Information Security Analysts design, implement, and maintain an organization's information security systems. They may also investigate security breaches and make recommendations to improve security. This course can help build a foundation for a career as an Information Security Analyst by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Cybersecurity Analyst
Cybersecurity Analysts design, implement, and maintain an organization's cybersecurity systems. They may also investigate cybersecurity breaches and make recommendations to improve security. This course can help build a foundation for a career as a Cybersecurity Analyst by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Journalist
Journalists investigate and report on news stories. They may specialize in a particular area, such as politics, business, or technology. This course can help Journalists build a foundation for a career in journalism by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Ethical Hacker
Ethical Hackers use their skills to help organizations find and fix security vulnerabilities. They may also work with law enforcement to investigate cybercrimes. This course can help build a foundation for a career as an Ethical Hacker by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Software Engineer
Software Engineers design, develop, and test software applications. They may specialize in a particular area, such as web development or mobile development. This course can help build a foundation for a career as a Software Engineer by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Data Analyst
Data Analysts collect, analyze, and interpret data to help businesses make better decisions. They may specialize in a particular area, such as finance, marketing, or healthcare. This course can help build a foundation for a career as a Data Analyst by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Web Developer
Web Developers design and develop websites and web applications. They may specialize in a particular area, such as front-end development or back-end development. This course can help build a foundation for a career as a Web Developer by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Computer Scientist
Computer Scientists design, develop, and test computer systems and applications. They may specialize in a particular area, such as artificial intelligence or cybersecurity. This course can help build a foundation for a career as a Computer Scientist by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Mobile Developer
Mobile Developers design and develop mobile applications. They may specialize in a particular area, such as iOS development or Android development. This course can help build a foundation for a career as a Mobile Developer by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Artificial Intelligence Engineer
Artificial Intelligence Engineers design, develop, and test artificial intelligence systems. They may specialize in a particular area, such as natural language processing or computer vision. This course may be useful for building a foundation for a career as an Artificial Intelligence Engineer by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Data Scientist
Data Scientists collect, analyze, and interpret data to help businesses make better decisions. They may specialize in a particular area, such as machine learning or artificial intelligence. This course may be useful for building a foundation for a career as a Data Scientist by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.
Machine Learning Engineer
Machine Learning Engineers design, develop, and test machine learning models. They may specialize in a particular area, such as natural language processing or computer vision. This course may be useful for building a foundation for a career as a Machine Learning Engineer by providing an understanding of the technology behind deep fakes, the potential ethical and privacy concerns, and how to analyze deep fakes to assess their threat level.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Fireside Chat: Reality Check on Deep Fakes.
Explores the broader implications of artificial intelligence for society, including the potential ethical and privacy concerns raised by deep fakes.
Explores the potential risks and harms posed by deep fakes, arguing that they could lead to a widespread loss of trust in information and institutions. Schick provides recommendations for mitigating these risks and calls for a multi-pronged approach involving governments, technology companies, and the public.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Fireside Chat: Reality Check on Deep Fakes.
Data Security Champion: Data Privacy and Ethics
Most relevant
Augmented Reality, Virtual Reality, and Mixed Reality:...
CCPA 101 – Consumer Rights & Business Obligations
Human Rights, Human Wrongs: Challenging Poverty,...
Australian Privacy Law Awareness
Information Governance: HIPAA
Solving the Opioid Crisis Teach-Out
Finding Common Ground Teach-Out
GDPR – in a Nutshell – 2nd Edition
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser