LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE

AI-AIDED CYBERSECURITY

DATES: 22 APR 2024 – 5 JUN 2024
DURATION: 7 WEEKSMONDAYS & WEDNESDAYS5 PM PST / 8 PM EST
STEPHEN SMITH
EX-GOOGLE, MICROSOFT
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
ON AI IN CYBERSECURITY
DATES:
22 APR 2024 – 5 JUN 2024
DURATION:
7 WEEKS
MONDAYS & WEDNESDAYS
5 PM PST / 8 PM EST
Develop dependable digital defenses! Use AI for threat detection, uphold ethics, and fortify security!

Stephen Smith has 35+ years of experience in data protection and threat-hunting. He’s worked with Google, Microsoft, HP, and the US Navy, and will teach you how to upgrade your cybersecurity strategies in 7 weeks.

THIS COURSE IS FOR YOU, IF...

  • YOU WANT TO SIMPLIFY TECH & AMPLIFY SECURITY

     

    Beat the learning curve. Deepen your AI/ML foundation to combat technical complexities and integration issues. Leverage your IT & computer science background to push data-driven insights.

  • YOU WANT TO HARNESS AI FOR IMPENETRABLE SECURITY

     

    Are you a security analyst/engineer? Prepare yourself to handle advanced cyber threats! Apply automation to routine security tasks and ramp up your threat & malware detection abilities.

  • YOU WANT TO IMPROVE CYBERSECURITY MANAGEMENT & INTEGRATION

     

    Implement better success metrics and keep security goals on schedule. Take your background experience as an IT manager or administrator and magnify it to enhance cloud security.

YOUR ASCENT STARTS HERE

Next year, cybercrime will cost the world $10.5T annually.

This is why careers in cybersecurity can range from $83k to over $227k!

Online threats only become more advanced. Fill in your knowledge gaps to be prepared for the current virtual landscape and future risks.

Revamped cybersecurity & revolutionized classes.

Gear up for insights from 4 industry leaders, real-world cases & interview coaching. Flip your newfound information to secure digital realms & explore career options.

Engage during office hours to discover additional information that customizes your learning experience. Then connect with like-minded classmates to expand your networks.

 
ABOUT THE COURSE / WHAT YOU'LL DO
01
LABS
Get ready to dive into anomaly detection, user behavior profiling, malware detection, NLP phishing models, cyber threat hunting, and adversarial examples with Python.
02
TASK-BASED LEARNING
Explore the intersections of AI & cybersecurity. Handle log data, build anomaly detection systems, analyze with ML, detect user behavior anomalies, and craft compelling data visuals.
03
FINAL PROJECT
Practice unlocks cyber expertise. Streamline data collection and analysis processes. The goal is to use AI/ML techniques to detect malicious activity, assist analysts, and visualize results using the ELK stack.
INSTRUCTOR
STEPHEN
SMITH
LINKEDIN PROFILE
  • Incident Data Analysis Lead, ex. Google & Microsoft
  • Over 35 years of threat hunting, adversary detection strategy development & building response teams
  • Served as a security program manager, a security officer, & submarine missile technician, for Microsoft, HP & the US Navy
  • Experienced network architect & engineering director who leads responses for high-profile security incidents & compromises
  • Enjoys playing guitar, restoring classic cars & golfing while sipping fine whiskey
SYLLABUS
00
FRI (4/19), 5 PM PST/8 PM EST
Welcome Lesson

In this kickoff, get to know your captain (aka instructor), understand the course route, and set sail with confidence by diving into the course structure, assignments, and a laid-back Q&A session.


  • Instructor introduction
  • Course structure & assignments
  • Q&A
More Less
01
MON (4/22), 5 PM PST/8 PM EST
AI-Aided Cybersecurity

Are we witnessing the birth of a cyber utopia, or does AI usher in its own set of challenges? Join us as we investigate the capabilities of AI, exploring its symbiotic dance with humans. Let's decode the promise, perils, and evolving roles that await security analysts, engineers, and end-users in this AI-driven era.


  • AI: Panacea or Pandora?
  • Role of humans in AI future
  • Problem-solving & AI 

[Optional] Assignment #1: Reflection: Navigating the AI-Cybersecurity Crossroads

More Less
02
WED (4/24), 5 PM PST/8 PM EST
Data Sources, Logs & Pipelines + Guest Speaker

Ever wondered why your data feels like it's playing hide-and-seek? Class 2 is all about demystifying the chaos. We'll navigate the wild world of scattered data, historical OS logs, and tangled pipelines. Get ready to decode the jargon, explore key terminology, and delve into the intricacies of Machine Learning pipeline operations (MLOps).


  • Data types & pipelines
  • Key terminology & software
  • Machine Learning pipeline operations (MLOps)
  • Guest speaker
  • Demo: Building a custom monitor

Assignment #2: Log Sources & Ingestion Pipeline Mastery

More Less
03
MON (4/29), 5 PM PST/8 PM EST
Data Extraction + Lab

Feeling overwhelmed by the data ocean? In Class 3, we're not handing out life preservers, but we're definitely providing you with the skills to navigate. Learn to turn data challenges into actionable insights, so you can spot threats amidst the deluge. From identifying problems to leveraging the right tools, master efficient data extraction.


  • Problem hunting: Location & access
  • Quantifying problems: Understanding, organizing & tools
  • Analyzing raw data & insights
  • Data-based problem-solving strategies
  • Lab: Data extraction

Assignment #3: Problem Hunting & Solutions

More Less
04
WED (5/1), 5 PM PST/8 PM EST
Data Pre-Processing & Transformation

Data processing is the tool that helps us refine raw information into actionable insights. Learn to clean, enrich, and standardize data, ensuring it speaks a universal language. With a focus on anomaly detection, statistical methods, and visualization, this class empowers you to extract key features and patterns, equipping you for the nuanced art of cybersecurity analysis.


  • Data cleaning & normalization
  • Enriching data
  • Standardizing diverse formats
  • Removing false positives & anomalies
  • Demo: Extracting key features & patterns

Assignment #4: Anomaly Detection System

More Less
05
MON (5/6), 5 PM PST/8 PM EST
Data Analysis + Lab

Congratulations, you have acquired that pristine, organized dataset. Now what? We'll delve into User and Entity Based Analytics (UEBA) and Behavior Profiling, equipping you to perform astute analyses in support of your security hypotheses. Get ready to don your data detective hat and uncover the hidden patterns within your cybersecurity data treasure trove.


  • Where’s Waldo? Finding a needle in a haystack of data
  • User & Entity Based Analytics (UEBA): Behavior Profiling
  • Performing initial analysis to support a hypothesis
  • Lab: Investigating security events & identifying security issues

Assignment #5: Analysis & Machine Learning with Logging Data

More Less
06
WED (5/8), 5 PM PST/8 PM EST
Enrichment & Detections + Lab

Elevate your data analysis game for cybersecurity by diving into feature extraction and enrichment strategies. Discover how transforming datasets enhances their analytical power, enabling you to detect malicious activities effectively & simplify data handling, storage, and analysis.


  • Enhanced accuracy & dimensionality
  • Detection systems for malicious activity
  • ATT&CK framework
  • Lab: Enriching features in log data

Assignment #6: Enriched Data: Building a Robust Detection System

More Less
07
MON (5/13), 5 PM PST/8 PM EST
Anomaly Detection

How to spot the odd one out in the digital realm? Class 7 teaches you to decipher the language of data and identify what's normal, what's not, and why it matters. From statistical methods to machine learning, this session equips you with a diverse toolbox to unravel the unique characteristics of each dataset, unveiling patterns and insights at scale.


  • Statistical methods
  • Analysis & sorting
  • Visualization
  • Machine Learning

Assignment #7: Detecting Anomalies in User Activity

More Less
08
WED (5/15), 5 PM PST/8 PM EST
Trend Analysis: Emerging Patterns + Lab

In cybersecurity, every day is a tactical chess match against ever-evolving opponents. From aggregating and sorting data to exploring machine learning for anomaly detection, we're on a journey to transform raw telemetry into actionable insights. Buckle up for a session that unveils the "modus operandi" of cyber threats, empowering you to stay steps ahead in the ever-shifting cybersecurity landscape.


  • Aggregation & sorting
  • Time series & correlation analysis
  • Machine Learning & anomaly detection
  • Behavioral patterns & end-point data analysis
  • Lab: Trend analysis: Time series & visualization

Assignment #8: Detecting Anomalies in User Activity: Part 2

More Less
09
MON (5/20), 5 PM PST/8 PM EST
Reduction: Streamlining for Clarity

In Class 9, we tackle the challenge of making complex data understandable for everyone. As security enthusiasts, we've gathered a wealth of information, but now it's time to streamline it. From selecting key data points to exporting reduced datasets, we're transforming raw insights into a clear, accessible format.


  • Selecting & aggregating key data points
  • Accessibility: Exporting reduced data
  • Lab: Cyber threat hunting

Assignment #9: Reduction & Presentation: Craft Your Story

More Less
10
WED (5/22), 5 PM PST/8 PM EST
Incident Analysis & Response

Ever wondered what to do when things go haywire in the digital realm? Join us for a session where we'll debunk the myths of incident response and equip you with practical strategies. From staying cool in the heat of a digital firefight to using AI for smarter incident management, we've got your back. It's time to turn chaos into calculated action!


  • Preparing for incidents
  • Incident command
  • Leveraging AI for future attacks using historic events
More Less
11
MON (5/27), 5 PM PST/8 PM EST
Real-Life Cyber Incidents: From the Infamous to the Obscure

Ever heard of those mind-bending cybersecurity scenarios at DefCon that felt too wild to be true? In this class, we'll discuss the nitty-gritty details of public and confidential cases, exploring how the maturity of data estates shaped the battlefield. It's not just tales; we'll dissect how ML and AI, our modern-day cyber allies, could have tipped the scales for both defenders and adversaries.


  • Famous cyber attacks
  • Lab: Visualizing incidents 

Assignment #10: Visualize to Realize: Incident Detection & ML

More Less
12
WED (5/29), 5 PM PST/8 PM EST
End-User & End-Point Security + Guest Speaker

Ever wondered if an attack goes unnoticed, did it really happen? Let's navigate the threats, explore AI-powered techniques, and ensure your fleet is ready for anything. A special guest speaker will be shedding light on the latest in End-Point Security – because being a step ahead is our cyber armor. Ready to outsmart digital adversaries?


  • End-user & end-point threats
  • Machine Learning techniques
  • Predictive end-user & end-point security
  • Techniques for highlighting anomalies
  • Guest speaker: End-point security
More Less
13
MON (6/3), 5 PM PST/8 PM EST
User Trust & Ethical Considerations + Guest Speaker

In Class 13, we dive into the wild west of AI in cybersecurity law and ethics, where the rules are still taking shape. Discover your responsibilities in this new frontier, exploring existing laws, their application, and ethical considerations for data use. Learn how to navigate cybersecurity regulations, ensuring you're on the right side of the equation when legal challenges arise.


  • Ethical considerations for AI in cybersecurity
  • Cybersecurity laws, policies & regulations
  • Cybersecurity awareness programs & insurance
  • User trust evaluation & development
  • Guest speaker: AI & cybersecurity awareness programs

Assignment #11: AI & Cybersecurity Awareness Programs

More Less
14
WED (6/5), 5 PM PST/8 PM EST
Future of AI & Career Outlook

In our final class, explore the future of AI in cybersecurity, uncovering the skills that spell career success. Get insider tips on crafting stellar resumes and acing interviews. It's not just a class – it's your roadmap to a thriving AI-driven cybersecurity career!


  • Future of AI in cybersecurity
  • Advised skills & career success development
  • Resume & cover letter guidance
  • Interview guidance

[Optional] Assignment #12: Resume Review

More Less

What our students say

Carlos Andres
BECOME AN ART DIRECTOR
"The group activities, they allow us to interact and exchange ideas, plus the way it is structured is challenging and mind twisting as we collaborate in different parts of the ideation."
Hayley Smith
BRANDING 101
"Overall I'm impressed with the level of detail and explanation around particular topics and subjects. There's a real depth to each module which for learning allows the information to stay in your brain."
Rebecca Kouwe
HUMAN RESOURCES ANALYTICS
"I really enjoy the format of the course. Lectures with real life examples and an ongoing case study. Also built in 20 minutes at the end of each class for questions is helpful."
Courtney Fulton
WOMEN IN LEADERSHIP
"I enjoyed the structure of the class. I like how we learned about a topic and practiced it in the workshops. It’s helped me to apply what I learned!"
APPLY
First name
This is required field!
Last name
This is required field!
Email
This is required field!
This is required field!
This is required field!
By registering and clicking “APPLY”, you agree to our
Terms of Use, Privacy policy and Cookie Policy