Course title

Artificial intelligence and machine-learning powered cyber attacks

Empower the IT and Cloud support team to understand and counter AI and ML-powered cyber attacks.

Aligned to

Why this course?

The Crime-as-a-Service (CaaS) business model allows non-technological cybercriminals to procure powerful tools and experts. They may hire technologically savvy cybercriminals or robust AI-powered systems on a short term basis, thus reducing expenses. These systems and experts enable them to increase the sophistication and power of their attacks exponentially. These factors increase the potential for AI and ML to become drivers of cybercrime. This course is designed to give a sufficiently deep overview of AI and ML-powered cyber attacks for the target audience.

The audience

Deliver this course to a wide segment of your workforce and external contractors.

IT Support

Cloud Support

Security, Risk and Compliance

The course content

Section 1

Introduction

What is AI?, What is ML?, The benefits of AI and ML, Why Cybercriminals are turning to AI?, Crime-as-a Service business model

Section 2

Malicious uses and abuse of AI

AI Malware, Social Engineering, AI-powered phishing, Robocalling, AI-supported password guessing, Abusing Smart Assistants, Human impersonation, Abusing online verification systems

Section 3

Deepfakes

What is a Deepfake?, Types of Deepfakes, Information Apocalypse or Reality Apathy, The technology behind Deepfakes, The Generative Network, The Adversarial Network, Case Studies, Future threats of Deepfake

Section 4

Countermeasures

Solutions and recommendations

Section 5

Assessment

Summary and assessment

Specs

Standards

LMS compatible

The courses on any standard LMS that supports SCORM, AICC or TINCAN

Responsive

Mobile friendly

Responsive courses with HTML5 as the underlying technology

Time

Learning time

Each course has an approximate learning time between 25-35 minutes.

Customize this course

Unlike off-the-shelf courses, customized content connects well with employees. At Security Quotient, we perfectly align training content with the organization’s security policies, brand guidelines and cultural nuances. Further, we translate the course to the native language spoken by the end-users along-with audio narration by native language speakers.

Learn more >

Get in touch

Schedule a free demo or arrange a call-back.

Schedule a demo

Check our calendar and pick a convenient slot.

Request a call-back

Select a date and time that works best for you.