🤑 You have $200 tuition credit

Apply and Redeem Now!
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE

AI-AIDED CYBERSECURITY COURSE

Dates: 15 JUL 2025 - 4 SEP 2025
Duration: 8 WEEKS
TUESDAYS & THURSDAYS
5 PM PT / 8 PM ET
STEPHEN SMITH
AMAZON
Stephen Smith
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE
LIVE ONLINE COURSE ON
AI-AIDED CYBERSECURITY
DATES:

15 JUL 2025 - 4 SEP 2025


DURATION:

8 WEEKS
TUESDAYS & THURSDAYS
5 PM PT / 8 PM ET

Strengthen digital defenses with AI. Learn how AI is used to attack and protect systems, enhance threat detection, and boost security efficiency — all while upholding ethical standards.

Stephen Smith is a security veteran with a proven track record. He’s worked with Google, Microsoft, HP, and the US Navy, and will teach you how to upgrade your cybersecurity strategies.

THIS COURSE IS FOR YOU, IF...

  • YOU ARE A CYBERSECURITY ANALYST READY TO LEVEL UP

     

    Take the guesswork out of AI-powered security. Learn AI/ML techniques to detect anomalies, automate threat responses, and stay ahead of cybercriminals.

  • YOU ARE A SYSTEM OR NETWORK SECURITY ENGINEER

     

    Struggling to integrate AI into your security workflow? Master AI-driven behavioral analysis to detect insider threats, analyze system behavior, and safeguard your networks.

  • YOU ARE A SECURITY MANAGER OR RISK ASSESSOR

     

    AI is changing risk management — are you keeping up? Learn how to integrate AI/ML into your security strategy while navigating ethical and regulatory challenges.

  • YOU ARE A SYSTEM OR CLOUD ADMINISTRATOR

     

    Cloud security needs more than traditional defenses. Apply AI/ML to detect cloud threats, automate incident responses, and fortify your organization’s security posture.

Our students work in 1600+ companies worldwide

  • Google logo
  • Apple logo
  • Ubisoft logo
  • Microsoft logo
  • Blizzard logo
  • Uber logo
  • Epic Games logo
  • Amazon logo
  • Spotify logo
  • Meta logo
  • PlayStation Studios logo
  • Nike logo
YOUR ASCENT STARTS HERE

Incorporating AI/ML into cybersecurity is the future. 

Learn how to proactively identify and mitigate evolving threats, enhance system resilience, and automate complex security tasks. Bridge your knowledge gaps and stay ahead in the ever-changing virtual landscape.

Insider cybersecurity angles & practical AI applications.

Gear up for live insights from an industry leader, real-world case studies, and demo labs. Gain vital practical skills in AI-aided cybersecurity and explore career options. Connect with like-minded people and expand your network.

 
ABOUT THE COURSE / WHAT YOU'LL DO
01
CASE STUDIES

Dive into real-world cybersecurity challenges and sharpen your threat detection skills. Analyze real attack scenarios, explore defense strategies, and apply AI-driven solutions to detect anomalies, mitigate risks, and strengthen security systems.

02
LABS

In six labs, sharpen your security AI skills — train intrusion detection models, classify malware, detect anomalies, and explore adversarial attacks using Python, Scikit-learn, and NLP techniques.

03
FINAL CAPSTONE PROJECT

Turn theory into practice and refine your cyber expertise. Your final capstone project focuses on Malware Detection with ML, where you'll streamline data collection, preprocess datasets, engineer features, and train models to detect malicious activity.

INSTRUCTOR

STEPHEN SMITH

LINKEDIN PROFILE
  • Senior Technical Program Manager at Amazon
  • Currently working on application security at Project Kuiper, which will put 10,000 satellites in orbit and deliver broadband internet all over the world
  • Over 40 years of threat hunting, adversary detection strategy development & building response teams
  • Served as a security program manager, a security officer, & submarine missile technician – for Microsoft, HP, & the US Navy
  • Experienced network architect & engineering director who leads responses for high-profile security incidents & compromises
Instructor Stephen Smith
syllabus
00
THU (7/10), 5 PM PT/8 PM ET
Welcome Class

Dive into what this course is all about. Meet your instructor, get a sneak peek at what’s ahead, and ask any burning questions.

  • Instructor introduction
  • Course structure & assignments
  • Q&A
More Less
01
TUE (7/15), 5 PM PT/8 PM ET
Introduction to AI and Cybersecurity

What is AI? Dive into its key types, machine learning and deep learning, and core cybersecurity concepts such as threats, vulnerabilities, attacks, and defenses. You will also explore the importance of AI in cybersecurity with real-world examples.

  • What is AI? 
  • Core cybersecurity concepts
  • Convergence of AI and cybersecurity
  • AI in cybersecurity: Real-world examples
More Less
02
THU (7/17), 5 PM PT/8 PM ET
Machine Learning Fundamentals

Dive into the basics of machine learning. Explore supervised and unsupervised learning, ML algorithms, such as linear regression, logistical regression, and decision trees, and the training, validation, and testing process.

  • Supervised vs. unsupervised learning
  • Key ML algorithms
  • Training, validation, and testing ML models
  • Python libraries

Assignment #1: Set up a notebook on the Jupyter Notebook server. 

More Less
03
TUE (7/22), 5 PM PT/8 PM ET
Introduction to Scikit-learn and Data Preprocessing

Discover how to implement the Sci-kit-learn workflow, apply data preprocessing techniques, and utilize these techniques to train and evaluate a simple classification model.

  • Demo: Introduction to processing data
  • Basic Sci-kit-learn workflow
  • Common data preprocessing techniques
  • Lab 1: Apply these techniques to a simple classification problem using the Iris dataset
  • Capstone project rundown

Assignment #2: In your capstone project notebook, retrieve the data file and follow the steps to preprocess and clean it.

More Less
04
THU (7/24), 5 PM PT/8 PM ET
AI for Threat Detection

Learn how AI enhances threat detection, explore the differences between anomaly detection, IDS, and malware detection, and dive into a real-world AI-driven threat detection system. 

  • Anomaly detection
  • Intrusion detection systems (IDS)
  • Malware detection
  • Case Study: Examining a real-world AI-driven threat detection system
More Less
05
TUE (7/29), 5 PM PT/8 PM ET
Outlier Identification and Anomaly Detection

Class 5 will teach you to use Sci-kit and a malware data set to identify outliers and understand how outliers can relate to anomalies and can identify attacks. You will also learn to apply feature engineering techniques to malware data sets and prepare to train and evaluate supervised learning models for malware detection.

  • Outliers and anomaly detection
  • Common anomaly detection strategies
  • Feature engineering for malware data.
  • Lab 2: Prepare to train and evaluate classification models for malware detection using Sci-kit-learn

Assignment #3: Set up your Jupyter Notebook and import the provided malware data into a data frame. 

More Less
06
THU (7/31), 5 PM PT/8 PM ET
AI for Vulnerability Assessment

Explore the role of AI in vulnerability assessment, differentiate between vulnerability scanning and penetration testing, and analyze how AI prioritizes and predicts vulnerabilities.

  • Vulnerability scanning & penetration testing
  • Prioritizing and predicting vulnerabilities
  • Automated vulnerability discovery
  • Case Study: AI-powered penetration testing tools
More Less
07
TUE (8/5), 5 PM PT/8 PM ET
Malware Classification

Delve into static and dynamic malware analysis and learn to apply feature extraction techniques to malware samples. You will also get hands-on experience training and evaluating classification models for malware identification in a practical lab.

  • Static and dynamic malware analysis
  • Feature extraction from malware samples
  • Lab 3: Build and evaluate classification models using Sci-kit-learn to identify malware families

Assignment #4: Visualize features using seaborn in Jupyter, identify important features, and relate labeled data to outliers.

More Less
08
THU (8/7), 5 PM PT/8 PM ET
AI for Incident Response + Guest Speaker

Learn how AI automates incident response workflows, AI-driven threat intelligence and attack containment, and the role of AI in a Security Operations Center (SOC).

  • Automating incident response workflows
  • AI-driven threat intelligence and correlation
  • Using AI to contain and remediate attacks
  • Case Study: AI in a Security Operations Center (SOC)
More Less
09
TUE (8/12), 5 PM PT/8 PM ET
AI for User Behavior Analytics (UBA)

In this class, you’ll learn types of user behavior and AI techniques to detect insider threats and account takeovers. You will also deep-dive into a real-world case study on the implementation of User Behavior Analytics (UBA) in an organization .

  • Normal vs. anomalous user behavior
  • Insider threat detection 
  • Account takeover detection
  • Case Study: Implementing UBA in Financial Services organizations
More Less
10
THU (8/14), 5 PM PT/8 PM ET
Anomaly Detection with Unsupervised Learning

Dive into anomaly detection in cybersecurity, unsupervised anomaly detection algorithms such as K-Means, Isolation Forest, and On-Class SVM, and use Sci-kit-learn to implement these algorithms for anomaly detection tasks in a hands-on lab.

  • Anomaly detection and its applications 
  • Unsupervised anomaly detection algorithms
  • Lab 4: Apply these algorithms to a cybersecurity-related anomaly detection task using Sci-kit-learn

Assignment #5: Train and evaluate your model using Sci-Kit.

More Less
11
TUE (8/19), 5 PM PT/8 PM ET
AI for Network Security + Guest Speaker

Class 11 will teach you network traffic for anomaly detection, AI’s role in DDoS attack mitigation and firewall optimization, and AI-driven network segmentation in coin-mining.

  • Network traffic analysis & anomaly detection
  • DDoS attack mitigation 
  • Firewall optimization
  • Case Study: AI-driven network segmentation
More Less
12
THU (8/21), 5 PM PT/8 PM ET
Natural Language Processing for Security

Explore the basics of Natural Language Processing (NLP) for security purposes, text preprocessing techniques, and sentiment analysis and topic modeling for security-related text analysis.

  • NLP for security basics
  • Text preprocessing techniques
  • Lab 5: Apply sentiment analysis to security-related text
  • Topic modeling for security data

Assignment #6: Validate your model and import test data into a data frame.

More Less
13
TUE (8/26), 5 PM PT/8 PM ET
Adversarial AI and Defense

In this class, you will cover attacks against AI systems, methods for defending against adversarial attacks, and the ongoing arms race between AI attackers and defenders in cybersecurity.

  • Adversarial attacks against AI systems 
  • Defending against adversarial attacks
  • Arms race between AI attackers and defenders
More Less
14
THU (8/28), 5 PM PT/8 PM ET
Adversarial Machine Learning

Explore the nature and impact of adversarial attacks, learn to generate basic adversarial examples, and practice implementing defenses to protect machine learning models from such attacks in a practical lab.

  • Adversarial attacks and their impact
  • Techniques for generating adversarial examples
  • Lab 6: Explore defenses against adversarial attacks
More Less
15
TUE (9/2), 5 PM PT/8 PM ET
Ethical Considerations of AI in Cybersecurity

Class 15 will teach you to identify biases in AI algorithms, analyze privacy concerns and data usage in cybersecurity, discuss the potential for AI misuse, and explain the principles for responsible AI development and deployment.

  • Bias in AI algorithms and its impact
  • Privacy concerns & data usage
  • Potential for AI misuse
  • Responsible AI development and deployment
More Less
16
THU (9/4), 5 PM PT/8 PM ET
The Future of AI in Cybersecurity

Delve into emerging trends and research areas in AI and cybersecurity, the impact of quantum computing on both fields, AI’s role in shaping cybersecurity’s future, and career paths in AI and cybersecurity.

  • Emerging trends & research areas
  • Quantum computing
  • AI in shaping cybersecurity’s future
  • Career paths

Capstone project: Malware Detection with Machine Learning
Apply the knowledge from the course to a Jupyter Notebook project that allows you to detect malware. Train your detector with samples of real malware.

More Less

What our students say

Student Carlos Andres
Carlos Andres
BECOME AN ART DIRECTOR
"The group activities, they allow us to interact and exchange ideas, plus the way it is structured is challenging and mind twisting as we collaborate in different parts of the ideation."
Student Hayley Smith
Hayley Smith
BRANDING 101
"Overall I'm impressed with the level of detail and explanation around particular topics and subjects. There's a real depth to each module which for learning allows the information to stay in your brain."
Student Rebecca Kouwe
Rebecca Kouwe
HUMAN RESOURCES ANALYTICS
"I really enjoy the format of the course. Lectures with real life examples and an ongoing case study. Also built in 20 minutes at the end of each class for questions is helpful."
Student Courtney Fulton
Courtney Fulton
WOMEN IN LEADERSHIP
"I enjoyed the structure of the class. I like how we learned about a topic and practiced it in the workshops. It’s helped me to apply what I learned!"
APPLY
First name
This is a required field
Last name
This is a required field
Email
This is a required field
This is a required field
This is required field!
By registering and clicking “APPLY”, you agree to our
Terms of Use, Privacy policy and Cookie Policy