AI Fundamentals for Cyber Security

Main Speaker

Learning Tracks

Course ID

42621

Date

01/12/2024

Time

Daily seminar
9:00-16:30

Location

John Bryce ECO Tower, Homa Umigdal 29 Tel-Aviv

Overview

This seminar will provide IT, systems, and cybersecurity professionals with essential knowledge on artificial intelligence (AI) and its practical applications in safeguarding digital assets. Participants will gain an understanding of AI concepts, explore advanced AI technologies, and learn how to leverage AI to improve their cybersecurity strategies through hands-on exercises.

Who Should Attend

 
  • IT/System/Cybersecurity Professionals: Individuals interested in being introduced to AI and its applications in cybersecurity.
  • Managers/Team Leaders: Those with basic technical knowledge looking to optimize their departments through the understanding of AI.

Prerequisites

Course Contents

Session 1: Introduction to AI in Cyber Security 
  • Overview of AI
    • Definition and types of AI (Narrow AI, General AI, Superintelligent AI)
    • Evolution and current trends in AI
  • AI in the Cyber World
    • Context and importance of AI in cybersecurity
    • Key applications and use cases
Session 2: Machine Learning and Natural Language Processing (NLP) 
  • Introduction to Machine Learning
    • Supervised, unsupervised, and reinforcement learning
    • Key algorithms and their applications in cybersecurity
  • Natural Language Processing
    • Overview of NLP
    • Use cases in cybersecurity (e.g., spam detection, threat intelligence)
Session 3: Popular AI Systems ChatGPT
    • Overview and capabilities
    • Use cases in cybersecurity
  • Google Bard (Gemini)
    • Overview and capabilities
    • Use cases in cybersecurity
  • Microsoft Co-Pilot
    • Overview and capabilities
    • Use cases in cybersecurity
Session 4: Practical Applications of AI in Cyber Security
  • AI in Scripting
    • Automating security scripts
    • Examples and demonstrations
  • AI in Log Analysis
    • Techniques for log analysis using AI
    • Real-world examples
  • Threat Analysis and Threat Hunting
    • Role of AI in identifying and mitigating threats
    • Case studies
Session 5: Hands-On Workshop 
  • Interactive Exercises
    • Building simple AI models for cybersecurity tasks
    • Practical exercises on log analysis and threat detection
  • Group Activities
    • Team-based threat hunting exercises using AI tools
Session 6: Limitations and Ethical Considerations of AI 
  • Disadvantages of AI
    • Potential risks and drawbacks
    • Situations where AI should not be used
  • Ethical Considerations
    • Privacy concerns
    • Bias and fairness in AI systems
    • Regulatory and compliance issues
Q&A and Wrap-Up
  • Open discussion
  • Addressing participants’ questions and concerns
  • Summary of key takeaways

The conference starts in

Days
Hours
Minutes
Seconds