Whether you are an aspiring AI enthusiast eager to delve into the realm of Cyber Security, a student aiming to fortify your understanding of securing digital landscapes, or a seasoned programmer who is looking to implement Python and Artificial Intelligence into Cyber Security Tools, this course is tailored for you!
Our approach is hands-on and practical, designed to engage you in the dynamic fusion of Artificial Intelligence and Cyber Security. We believe in learning by doing, guiding you through real-world techniques and methods utilised by experts in the field. At the start of this course, we will dive right in by showing you how to use ChatGPT for Cyber Security. You will learn practical ways to make the most of ChatGPT, from understand its basics to using it for data analysis and other advanced features. After that we will dive into topics like:
1. ChatGPT For Cyber Security/Ethical Hacking – In this section, we delve into the dynamic world of ChatGPT for Cyber Security and Ethical Hacking, exploring key topics that range from addressing mistakes and inaccuracies in ChatGPT to understanding the intricacies of prompt engineering, including context prompting and output formatting. Through hands-on exercises, participants will tackle Few-Shot prompting and Chain of thought prompting, building a solid foundation in applying ChatGPT effectively. Additionally we’ll navigate through advanced functionalities like Data Analysis, DALL E integration, and plugin utilisation, providing practical insights into preventing data leakage and exploring alternatives to ChatGPT.
-
Mistakes and Inaccuracies in ChatGPT
-
Introduction to prompt engineering
-
Few-shot prompting
-
Chain of thought prompting
-
Building Custom Instructions
-
Summarising Data
-
Advanced ChatGPT functionality (Data Analysis, Dalle, Plugins)
-
Alternatives to ChatGPT (Bard, Claude, Bing Chat)
-
How Companies leak their data to ChatGPT
2. New Age Of Social Engineering – In this section we unravel the concept of social engineering, delving into its nuances and equipping participants with strategies to prevent potential threats. The module further explores Implementing Artificial Intelligence to explore new social engineering techniques which include voice cloning and creation of deepfakes.
-
What is social engineering ?
-
Voice Cloning with ElevenLabs
-
AI Voice Generating with Resemble
-
Creating deepfakes with D-ID
-
Using ChatGPT to write Emails in my style
-
How to recognise these type of scams
3. Where Is AI Used In Cyber Security Today – In this section we explore the forefront of cybersecurity advancements, delving into the integration of AI across critical domains. Students will gain insights into how traditional Cybersecurity tools like Firewalls, SIEM systems, IDS/IPS, Email Filtering and Identity and Access Management work when Artificial Intelligence is applied to them.
-
AI Based SIEM Systems
-
Firewalls With AI
-
Email Filtering With AI
-
AI In IAM
-
IDS/IPS with AI
4. Building an Email Filtering System With AI – In this section students encounter a hands-on journey, utilising Python programming to implement Artificial Intelligence algorithms for crafting effective email filtering system. This module not only introduces the fundamentals of email filtering and security but also provides a comprehensive understanding of spam filters, guiding learners through dataset analysis, algorithm implementation and practical comparisons with established systems like ChatGPT.
-
Introduction To Email Security and Filtering
-
What are Spam filters and how do they work ?
-
Dataset analysis
-
Training and testing our AI system
-
Implementing Spam detection using ChatGPT API
-
Comparing our system vs ChatGPT system
5. Building a Phishing Detection System With AI – In this section, students will gain essential knowledge about phishing and acquiring skills to recognise phishing attacks. Through practical implementation, this module guides learners in utilising decision trees with Python programming, enabling them to construct a robust phishing detection system.
-
Introduction To Phishing
-
How to Recognise and Prevent Phishing Attacks
-
Dataset Analysis
-
Splitting The Data
-
Introduction To Decision Trees
-
Training Random Forest Algorithm
-
Precision and Recall
6. AI In Network Security – In this section, students get into the foundations of network security, exploring traditional measures alongside practical implementations using Python. With the help of Logistic Regression, learners gain hands-on experience in building a system for network monitoring.
-
Introduction To Network Security
-
Dataset Analysis
-
Data Pre-Processing
-
Data Preparation
-
Logistic Regression
-
Training Logistic Regression For Network Monitoring
-
Hyperparameter Optimisation
7. AI For Malware Detection – In this section students get on a comprehensive exploration of malware types and prevention strategies before delving into the creation of a sophisticated malware detection system. This module guides learners through the training of multiple algorithms learned throughout the course, empowering them to evaluate and implement the most accurate solution for malware detection system.
-
What Is Malware & Different Types of Malware
-
Traditional Systems for Malware Detection
-
Loading Malware Dataset
-
Malware Dataset Analysis and Pre-Processing
-
Training Machine Learning Algorithms
-
Saving The Best Malware Detection Model
8. AI Security Risks – In this section we explore critical Artificial Intelligence security risks such as data poisoning, data bias, model vulnerabilities and ethical concerns. This module dives into deep understanding of potential risks and ethical considerations of Artificial Intelligence Implementation.
-
Data Poisoning
-
Data Bias
-
Model Vulnerabilities
-
Ethical Concerns
9. Appendix A: Introduction To Cyber Security – This is our first Appendix section which is a cybersecurity foundational journey, tracing the evolution of cybersecurity and gaining insights into essential tools, techniques, certificates and best practices. This module serves as a compass, guiding learners through the core principles of cybersecurity.
-
Evolution Of Cyber Security
-
Categories of Cyber Attacks
-
Security Policies and Procedures
-
Cyber Security Tools and Technologies
-
Understanding Cyber Security Certifications
-
Cyber Security Best Practices
10. Appendix B: Introduction to Artificial Intelligence – This is our second Appendix section which is Artificial Intelligence fundamentals, covering brief history, diverse categories such as Narrow, General and Super intelligence and the distinctions between AI, machine learning and deep learning.
-
Brief History of AI
-
Types of AI: Narrow, General and Superintelligence
-
AI vs ML vs Deep Learning
-
Fields influenced by AI
-
Machine Learning Algorithms
-
AI Ethics and Governance
We assure you that this bootcamp on Artificial Intelligence in Cyber Security is designed to be the most comprehensive online course for mastering integration of AI in cybersecurity practices!
ChatGPT For Cyber Security/Ethical Hacking
New Age Of Social Engineering
-
3What, Why, How Of This Section
-
4[A/P] What is Prompt Engineering in Generative AI?
-
5[A/P] How to use Few Shot Prompting to achieve better ChatGPT responses?
-
6[A/P] Using Chain Of Thought Prompting to get more detailed and quality response
-
7[A/P] Exercise: Analyzing log files with ChatGPT4
-
8[A/P] Exercise Solution
-
9[A/P] How to create Custom Instructions?
-
10[A/P] How to use Generative AI for data summerization?
-
11[A/P] Advanced ChatGPT Techniques
-
12[A/P] Exercise: Finding patterns in log files
-
13[A/P] Exercise Solution
-
14[A/P] How to protect personal and company data when using ChatGPT?
Where Is AI Used In Cyber Security Today
-
15What, Why, How Of This Section
-
16[A/T] What Is Social Engineering ?
-
17[A/P/T] Voice Cloning With ElevenLabs
-
18[A/P/T] AI Voice Generating With Resemble
-
19[A/P/T] Creating Deepfakes With D-ID
-
20[A/P/T] Using ChatGPT To Write Emails In My Style
-
21[A/P/T] How To Recognize These Type Of Scams
-
22Quiz
Building An Email Filtering System With AI
Building A Phishing Detection System With AI
-
30What, Why, How Of This Section
-
31[A/T] Introduction To Email Security And Filtering
-
32[A/T] What Are Spam Filters And How Do They Work ?
-
33[A/P] Google Collab
-
34[A/P] How to create a copy of a workbook?
-
35[A/P] Introduction to the Email Spam detection AI system
-
36[A/P] How to load data and work with different data source files?
-
37[A/P] Analyzing email spam dataset
-
38[A/P] How to analyze and work with text data?
-
39[A/P] How to clean and prepare text data for AI/ML?
-
40[A/P] How to transform email data from text to numbers - Vectorization
-
41[A/P] Intuition lecture K Nearest Neighbors (KNN) algorithm
-
42[A/P] Training KNN algorithm to detect spam emails
-
43[A/P] Creating Spam Detection system using OpenAI API and GPT-4
-
44Quiz
AI In Network Security
-
45What, Why, How Of This Section
-
46[A/T] What is Phishing in the cyber-world?
-
47[A/T] How To Recognize And Prevent Phishing Attacks
-
48[A/P] Loading and understanding Phishing dataset
-
49[A/P] Analyzing Phishing data
-
50[A/P] Preparing dataset for machine learning/AI
-
51[A/P] Intuition lecture Decision Trees algorithm
-
52[A/P] Training Random Forest Algorithm to recognize Phishing websites
-
53[A/P] How to check the AI system performance - Precision and Recall
-
54Quiz
AI For Malware Detection
-
55What, Why, How Of This Section
-
56[A/T] Introduction To Network Security
-
57[A/P] Understanding Network Anomaly dataset
-
58[A/P] Preparing network anomaly dataset - part 1
-
59[A/P] Preparing network anomaly dataset - part 2
-
60[A/P] Intuition lecture Logistic Regression algorithm
-
61[A/P] Training Logistic Regression For Network Monitoring
-
62[A/P] How to improve an ML/AI algorithm? - Hyperparameter Optimization
-
63Quiz
AI Security Risks
-
64What, Why, How Of This Section
-
65[A/T] What Is Malware & Different Types Of Malware
-
66[A/T] How Traditional Systems For Malware Detection work?
-
67[A/P] Loading and analyzing Malware Dataset
-
68[A/P] Preparing Malware Dataset for ML/AI
-
69[A/P] Training Machine Learning based Malware detection system
-
70[A/P] How to save the best performing Malware Detection Model for later reuse?
-
71Quiz