Navigate the intersection of AI and cybersecurity in this cutting-edge learning path aimed at security analysts looking to harness AI's potential. Learn how to leverage Microsoft Security Copilot, fine-tune models, and master explainable AI.
-
Deploy Microsoft Security Copilot to automate threat detection.
-
Implement OWASP Top 10 safeguards for LLM systems.
-
Build custom cybersecurity models with Mistral and Llama.
Courses
-
1
Understanding Artificial Intelligence Concepts and Terminology with ISO/IEC 22989:20222h 17mUnderstanding Artificial Intelligence Concepts and Terminology with ISO/IEC 22989:2022
By: Lyron Andrews
Learn how the concepts and terminology of ISO/IEC 22989 aid your organization to establish common objectives and goals for AI use or production and maintain strategic alignment.
-
2
The AI-Driven Cybersecurity Analyst32mThe AI-Driven Cybersecurity Analyst
By: Mike Wylie
Learn how to leverage AI as a powerful tool and lead the next generation of cybersecurity professionals.
-
3
The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview1h 38mThe OWASP Top 10 for Large Language Model (LLM) Applications: An Overview
By: Reet Kaur
Learn to secure LLM applications by understanding the 2025 OWASP Top 10 risks and applying real-world mitigation strategies.
-
4
AI Product Security: Incident Response1h 31mAI Product Security: Incident Response
By: Malcolm Shore
Learn about the kind of events which lead to AI incidents, how to respond to them, and how to communicate effectively through the response.
-
5
XAI and Interpretability in Cybersecurity2h 22mXAI and Interpretability in Cybersecurity
By: Stephanie Itimi
This course unlocks the power of explainable AI for smarter cybersecurity decisions.
-
6
Fine-Tuning LLMs for Cybersecurity: Mistral, Llama, AutoTrain, AutoGen, and LLM Agents2h 52mFine-Tuning LLMs for Cybersecurity: Mistral, Llama, AutoTrain, AutoGen, and LLM Agents
By: Akhil Sharma
Explore the intersection of cybersecurity and large language models (LLMs). Learn how to leverage LLMs for open-source intelligence (OSINT), vulnerability scanning, and more.
-
7
RAG for Cybersecurity: Use Cases and Implementation1h 10mRAG for Cybersecurity: Use Cases and Implementation
By: Brennan Lodge
This course provides advanced training on how retrieval-augmented generation (RAG) technology enhances cybersecurity.
Instructors
Lyron Andrews
Mike Wylie
Author | Keynote Speaker | 4x CVEs | Consultant | People Leader
Reet Kaur
CISO | CAIO | AI, Cybersecurity & Risk Leader | Board & Executive Advisor| NACD.DC
Malcolm Shore
Cybersecurity and AI Consultant
Stephanie Itimi
Akhil Sharma
🏴☠️Offensive AI Security Research🏴☠️
Brennan Lodge
Founder | Cybersecurity Data Scientist | Speaker | Advisor | Award winning Researcher