Course title
Artificial intelligence and machine-learning powered cyber attacks
Empower the IT and Cloud support team to understand and counter AI and ML-powered cyber attacks.

Aligned to

Why this course?
The Crime-as-a-Service (CaaS) business model allows non-technological cybercriminals to procure powerful tools and experts. They may hire technologically savvy cybercriminals or robust AI-powered systems on a short term basis, thus reducing expenses. These systems and experts enable them to increase the sophistication and power of their attacks exponentially. These factors increase the potential for AI and ML to become drivers of cybercrime. This course is designed to give a sufficiently deep overview of AI and ML-powered cyber attacks for the target audience.
The audience
Deliver this course to a wide segment of your workforce and external contractors.

IT Support

Cloud Support

Security, Risk and Compliance
The course content
Section 1
Introduction
What is AI?, What is ML?, The benefits of AI and ML, Why Cybercriminals are turning to AI?, Crime-as-a Service business model
Section 2
Malicious uses and abuse of AI
AI Malware, Social Engineering, AI-powered phishing, Robocalling, AI-supported password guessing, Abusing Smart Assistants, Human impersonation, Abusing online verification systems
Section 3
Deepfakes
What is a Deepfake?, Types of Deepfakes, Information Apocalypse or Reality Apathy, The technology behind Deepfakes, The Generative Network, The Adversarial Network, Case Studies, Future threats of Deepfake
Section 4
Countermeasures
Solutions and recommendations
Section 5
Assessment
Summary and assessment
Specs
Standards
LMS compatible
The courses on any standard LMS that supports SCORM, AICC or TINCAN
Responsive
Mobile friendly
Responsive courses with HTML5 as the underlying technology
Time
Learning time
Each course has an approximate learning time between 25-35 minutes.
Customize this course
Unlike off-the-shelf courses, customized content connects well with employees. At Security Quotient, we perfectly align training content with the organization’s security policies, brand guidelines and cultural nuances. Further, we translate the course to the native language spoken by the end-users along-with audio narration by native language speakers.

Get in touch
Schedule a free demo or arrange a call-back.