Course

Artificial intelligence and machine-learning powered cyber attacks training course

Artificial Intelligence and Machine Learning is taking its flight to an advanced level aiming for superintelligence. Aside from the positive uses of AI and ML, there are instances of malicious misuse of these emerging technologies. Our 100% customizable AI ML awareness training program will enable employees to defend your organization by preparing them to be cybersecurity warriors. 

Fig: Artificial Intelligence and Machine Learning-learning path

Aligned to

Why this course?

The Crime-as-a-Service (CaaS) business model allows non-technological cybercriminals to procure powerful tools and experts. They may hire technologically savvy cybercriminals or robust AI-powered systems on a short term basis, thus reducing expenses. These systems and experts enable them to increase the sophistication and power of their attacks exponentially. These factors increase the potential for AI and ML to become drivers of cybercrime. This course is designed to give a sufficiently deep overview of AI and ML-powered cyber attacks for the target audience.

The audience

Deliver this course to a wide segment of your workforce and external contractors.

IT Support

Cloud Support

Security, Risk and Compliance

The course content

Section 1

What is Artificial Intelligence?

What is AI?, What is ML?, The benefits of AI and ML, Why Cybercriminals are turning to AI?, Crime-as-a Service business model

Fig: What is Artificial Intelligence section 1 sample


Section 2

Malicious uses and abuse of AI

AI Malware, Social Engineering, AI-powered phishing, Robocalling, AI-supported password guessing, Abusing Smart Assistants, Human impersonation, Abusing online verification systems

Fig: Malicious uses and abuse of AI section 2 sample


Section 3

Deepfakes

What is a Deepfake?, Types of Deepfakes, Information Apocalypse or Reality Apathy, The technology behind Deepfakes, The Generative Network, The Adversarial Network, Case Studies, Future threats of Deepfake

Fig: Deepfakes section 3 sample


Section 4

Countermeasures

Solutions and recommendations

Fig: Solutions and recommendations section 4 sample


Section 5

Assessment

Summary and assessment

Fig: Assessment section 5 sample


Specs

Standards

LMS compatible

The courses on any standard LMS that supports SCORM, AICC or TINCAN

Responsive

Mobile friendly

Responsive courses with HTML5 as the underlying technology

Time

Learning time

Each course has an approximate learning time between 25-35 minutes.

Customize this course

Unlike off-the-shelf courses, customized content connects well with employees. At Security Quotient, we perfectly align training content with the organization’s security policies, brand guidelines and cultural nuances. Further, we translate the course to the native language spoken by the end-users along-with audio narration by native language speakers.

Learn more >

Frequently asked questions

Find answers to common questions on Artificial Intelligence

AI is a branch of computer science dedicated to building computer systems that can perform tasks normally requiring human intelligence, such as visual perception, speech recognition, translation between languages, decision making and problem-solving.

Machine Learning (ML), is a subset of AI, consists of algorithms that “learn” from data and improve through experience.

  1. Supervised
  2. semi-supervised
  3. unsupervised and,
  4. reinforcement

Artificial Intelligence accelerates processes, which in turn boosts the rate of cyber-attacks, making it hard for the victims to develop new defence strategies in a limited time frame. For example, AI is used in deepfake attacks to create false audio or video files using deep-learning algorithms that can evade the human eye and bypass software detection.

  1. Deepfake
  2. AI-based botnet attack
  3. AI-based spear phishing
  4. AI-based password guessing

Get in touch

Schedule a free demo or arrange a call-back.

Schedule a demo

Check our calendar and pick a convenient slot.

Request a call-back

Select a date and time that works best for you.