Cybersecurity in AI Systems Training Course
Securing AI systems presents unique challenges that differ from traditional cybersecurity approaches. AI systems are vulnerable to adversarial attacks, data poisoning, and model theft, all of which can significantly impact business operations and data integrity. This course explores key cybersecurity practices for AI systems, covering adversarial machine learning, data security in machine learning pipelines, and compliance requirements for robust AI deployment.
This instructor-led, live training (online or onsite) is aimed at intermediate-level AI and cybersecurity professionals who wish to understand and address the security vulnerabilities specific to AI models and systems, particularly in highly regulated industries such as finance, data governance, and consulting.
By the end of this training, participants will be able to:
- Understand the types of adversarial attacks targeting AI systems and methods to defend against them.
- Implement model hardening techniques to secure machine learning pipelines.
- Ensure data security and integrity in machine learning models.
- Navigate regulatory compliance requirements related to AI security.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction to AI Security Challenges
- Understanding security risks unique to AI systems
- Comparing traditional cybersecurity vs. AI cybersecurity
- Overview of attack surfaces in AI models
Adversarial Machine Learning
- Types of adversarial attacks: evasion, poisoning, and extraction
- Implementing adversarial defenses and countermeasures
- Case studies on adversarial attacks in different industries
Model Hardening Techniques
- Introduction to model robustness and hardening
- Techniques for reducing model vulnerability to attacks
- Hands-on with defensive distillation and other hardening methods
Data Security in Machine Learning
- Securing data pipelines for training and inference
- Preventing data leakage and model inversion attacks
- Best practices for managing sensitive data in AI systems
AI Security Compliance and Regulatory Requirements
- Understanding regulations around AI and data security
- Compliance with GDPR, CCPA, and other data protection laws
- Developing secure and compliant AI models
Monitoring and Maintaining AI System Security
- Implementing continuous monitoring for AI systems
- Logging and auditing for security in machine learning
- Responding to AI security incidents and breaches
Future Trends in AI Cybersecurity
- Emerging techniques in securing AI and machine learning
- Opportunities for innovation in AI cybersecurity
- Preparing for future AI security challenges
Summary and Next Steps
Requirements
- Basic knowledge of machine learning and AI concepts
- Familiarity with cybersecurity principles and practices
Audience
- AI and machine learning engineers looking to improve security in AI systems
- Cybersecurity professionals focusing on AI model protection
- Compliance and risk management professionals in data governance and security
Open Training Courses require 5+ participants.
Cybersecurity in AI Systems Training Course - Booking
Cybersecurity in AI Systems Training Course - Enquiry
Cybersecurity in AI Systems - Consultancy Enquiry
Consultancy Enquiry
Testimonials (5)
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
Nothing it was perfect.
Zola Madolo - Vodacom
Course - Android Security
It opens up a lot and gives lots of insight what security
Nolbabalo Tshotsho - Vodacom SA
Course - Advanced Java Security
This topic is better with F2F, but this online training is still handled well . The important thing is the trainees were able to have understanding of Hyperledger Indy
OMAR BIN MUSA - UNITAR International University
Course - Blockchain: Hyperledger Indy for Identity Management
Upcoming Courses
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at sysadmins who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
By the end of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using the web console and CLI.
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD for faster performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
Active Directory for Admins
21 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at system administrators who wish to use Microsoft Active Directory to manage and secure data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Set up a domain and define access rights of users and devices.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication.
Android Security
14 HoursAndroid is an open platform for mobile devices such as handsets and tablets. It has a large variety of security features to make developing secure software easier; however, it is also missing certain security aspects that are present in other hand-held platforms. The course gives a comprehensive overview of these features, and points out the most critical shortcomings to be aware of related to the underlying Linux, the file system and the environment in general, as well as regarding using permissions and other Android software development components.
Typical security pitfalls and vulnerabilities are described both for native code and Java applications, along with recommendations and best practices to avoid and mitigate them. In many cases discussed issues are supported with real-life examples and case studies. Finally, we give a brief overview on how to use security testing tools to reveal any security relevant programming bugs.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn the security solutions on Android
- Learn to use various security features of the Android platform
- Get information about some recent vulnerabilities in Java on Android
- Learn about typical coding mistakes and how to avoid them
- Get understanding on native code vulnerabilities on Android
- Realize the severe consequences of unsecure buffer handling in native code
- Understand the architectural protection techniques and their weaknesses
- Get sources and further readings on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursImplementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification and anonymity – is given, while also presenting the typical problems that may damage these requirements along with real-world solutions.
As a critical aspect of network security is cryptography, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical background, these elements are discussed from a developer's perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.
Typical crypto vulnerabilities are discussed both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.
Finally, as XML technology is central for data exchange by networked applications, the security aspects of XML are described. This includes the usage of XML within web services and SOAP messages alongside protection measures such as XML signature and XML encryption – as well as weaknesses in those protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Understand security concepts of Web services
- Get sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursThis three day course covers the basics of securing the C/C++ code against the malicious users who may exploit many vulnerabilities in the code with memory management and input handling, the course cover the principals of writing secure code.
Advanced Java Security
21 HoursEven experienced Java programmers are not mastering by all means the various security services offered by Java, and are likewise not aware of the different vulnerabilities that are relevant for web applications written in Java.
The course – besides introducing security components of Standard Java Edition – deals with security issues of Java Enterprise Edition (JEE) and web services. Discussion of specific services is preceded with the foundations of cryptography and secure communication. Various exercises deal with declarative and programmatic security techniques in JEE, while both transport-layer and end-to-end security of web services is discussed. The use of all components is presented through several practical exercises, where participants can try out the discussed APIs and tools for themselves.
The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform and web-related vulnerabilities. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Understand security concepts of Web services
- Learn to use various security features of the Java development environment
- Have a practical understanding of cryptography
- Understand security solutions of Java EE
- Learn about typical coding mistakes and how to avoid them
- Get information about some recent vulnerabilities in the Java framework
- Get practical knowledge in using security testing tools
- Get sources and further readings on secure coding practices
Audience
Developers
FreeIPA for Administrators
14 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize the authentication, authorization and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single central location.
- Use FreeIPA's CLI, Web UI and RPC interface to set up and manage permissions.
- Enable Single Sign On authentication across all systems, services and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate and migrate an FreeIPA server.
Blockchain: Hyperledger Indy for Identity Management
14 HoursIn this instructor-led, live training in Lithuania (online or onsite), participants will learn how to create an Indy-based decentralized identity system.
By the end of this training, participants will be able to:
- Create and manage decentralized, self-sovereign identities using distributed ledgers.
- Enable interoperability of digital identities across domains, applications, and silos.
- Understand key concepts such as user-controlled exchange, revocation, Decentralized Identifiers (DIDs), off-ledger agents, data minimization, etc.
- Use Indy to enable identity owners to independently control their personal data and relationships.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at system administrators who wish to use Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into an existing application.
- Implement security with multi-factor authentication.
OpenLDAP for Linux Systems
7 HoursOpenLDAP is open source software for implementing the LDAP (Lightweight Directory Access Protocol), which allows management and access to information directories. Jest is a popular directory server that can be used to store and share data about users, groups, network resources and other objects on the network.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to start configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Use federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to extend identity management securely across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in Lithuania (online or onsite) is aimed at system administrators who wish to use OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.