Get The
AI CERTs
LMS App
Unlock exclusive app-only features
Download App
×
Skip to main content
AI+ Security Level 1™
0%
Previous
Course data
Introduction
Course Introduction
Lab Instructions
Essential AI Security GPT Tools
Essential AI Security Tools
Audio Book: Introduction AI+ Security Level 1
Module 1: Introduction to AI Cybersecurity
Module 1: Introduction to CyberSecurity
Audio Book: Introduction to AI Cybersecurity
Podcast: Introduction to AI Cybersecurity
1.1 Overview of Cybersecurity and Its Domains
1.2 Scope and Objectives
1.2.1 Essential AI Security GPT Tools - Genaric Video
1.2.2 Essential Security Tools Used - Genaric Video
Activity: Hotspot
1.3 Threats, Vulnerabilities, and Risks
1.4 Defense in Depth
1.5 Security Policies and Procedures
1.6 Access Control and Cryptography
1.6.1 AI-Powered Password Security and Strength Analysis
Activity: True or False
1.7 CIA Triad (Confidentiality, Integrity, Availability
Activity: Drag and Drop
1.8 Cybersecurity Frameworks: NIST and ISO/IEC 27001
1.9 Comparison of Frameworks and Implementation Guidelines
Activity: Tab
1.10 General Data Protection Regulation (GDPR)
1.11 Health Insurance Portability and Accountability Act (HIPAA)
1.12 Compliance Strategies and Legal Consequences
Activity: Fill in the blank
1.13 Business Continuity
1.14 Regulatory Compliance, Innovation, and Competitive Advantage
Activity: Problem Statement
1.15 Careers in Cyber Security
Activity: Let's Check your Knowledge
Quiz
Lab Practice 1.1
Labs Manual For Module 1
Module 2: Operating System Fundamentals
Module 2: Operating System Fundamentals
Audio Book: Operating System Fundamentals
Podcast: Operating System Fundamentals
2.1 Memory and Process Management
2.2 File System and Device Management
2.3 System Performance Monitoring
Activity: Multiple Choice
2.4 User Account Types and Account Management
2.5 Privilege Levels, Authentication Mechanisms, and Account Security Best Practices
Activity: True or False
2.6 ACLs, DAC, MAC, RBAC, and ABAC
Activity: Drag & Drop
2.7 OS Security Features and Configurations
Activity: FlipCard
2.8 Patching and Updates
2.9 Service Management and Security Policies
2.10 Configuration Management and Security Audits
Activity: Quiz
2.11 Virtual Machine and Container Security
2.12 Hypervisor Security
2.13 Network Isolation
2.14 Security Tools
Activity: Case Study
2.15 Secure Boot
2.16 Trusted Platform Module (TPM)
2.17 Remote Access Protocols
2.18 Multi-Factor Authentication (MFA)
2.19 Remote Access Best Practices
Activity: Carousel
2.20 Common OS Vulnerabilities
2.21 Vulnerability Assessment Tools
2.22 Patch Management
2.23 Security Hardening
2.24 Incident Response
Activity: Multiple Choice
Activity: Let's Check your Knowledge
Quiz
Module 3: Networking Fundamentals
Module 3: Networking Fundamentals
Audio Book: Networking Fundamentals
Podcast: Networking Fundamentals
3.1 Network Topologies
3.2 Transmission Control Protocol/Internet Protocol (TCP/IP) Model
3.3 Open Systems Interconnection (OSI) Model
3.4 Protocol Overview and Functionality
Activity: Hotspot
3.5 Routers and Switches
3.6 Firewalls, Access Points, and Network Interface Cards (NICs)
3.7 Case Study
Activity: Case Study
3.8 Firewalls and Intrusion Detection Systems (IDS)
3.9 Intrusion Prevention Systems (IPS)
3.10 Unified Threat Management (UTM) and Network Access Control (NAC)
3.11 Case Study
Activity: Tab
3.12 Network Segmentation
3.13 VLANs and DMZ (Demilitarized Zone)
3.14 Subnetting and Security Zones
3.14.1 AI-Powered DNS Traffic Anomaly Detection
Activity: Text Entry
3.15 Wireless Security Protocols
3.16 WEP Vulnerabilities and WPA2 Security
3.17 Case Study
Activity: Scenario
3.18 VPN Technologies and Use Cases
Activity: Drag and Drop
3.19 NAT Overview, Types, and Configuration
Activity: Quiz
3.20 Basic Network Troubleshooting
Activity: Carousel
Activity: Let's Check your Knowledge
Quiz
Lab Practice 3.1
Labs Manual For Module 3
Module 4: Threats, Vulnerabilities and Exploits
Module 4: Threats, Vulnerabilities, and Exploits
Audio Book: Threats, Vulnerabilities and Exploits
Podcast: Threats, Vulnerabilities and Exploits
4.1 Script Kiddies, Hacktivists, and Nation-State Actors
4.2 Cyber Criminals and Insider Threats
Activity: True or False
4.3 Threat Hunting Methodologies using AI
Activity: Accordion
4.4 SIEM, IDS, and IPS
4.5 Endpoint Detection and Response (EDR) and User and Entity Behavior Analytics (UEBA)
Activity: Multiple Choice
4.6 Exploring OSINT: Data Sources and Tools
4.7 OSINT Techniques, Strategies and Ethical Considerations
4.7.1 AI-Powered Web Application Security
Activity: Flip Card
4.8 Vulnerabilities: Types and Common Examples
4.9 Vulnerability Lifecycle and Databases
Activity: Sequence
4.10 DevSecOps and Secure Coding Practices
Activity: Tab
4.11 Zero-Day Attacks: Detection and Prevention
4.12 Patch Management: Automation and Validation
4.12.1 Detecting Zero-Day Exploits Using Behavioral Analysis and Anomaly Detection
Activity: Fill in the Blank
4.13 Vulnerability Scanning: AI and Automation
4.14 Risk Assessment and Remediation Strategies
Activity: Drag and Drop
4.15 Exploit Development
4.16 Metasploit Framework
4.17 Buffer Overflow Exploits
4.18 Web Application Exploits
4.19 Post-Exploitation Techniques
Activity: Tab
Activity: Let's Check your Knowledge
Quiz
Lab Practice 4.1
Lab Practice 4.2
Labs Manual For Module 4
Module 5: Understanding of AI and ML
Module 5: Understanding of AI and ML
Audio Book: Understanding of AI and ML
Podcast: Understanding of AI and ML
5.1 Definition and History of AI
Activity: Timeline
5.2 Supervised, Unsupervised, and Reinforcement Learning
5.3 Natural Language Processing (NLP)
5.4 Computer Vision
Activity: Fill in the Blank
5.5 Risk Assessment, Bias, Fairness, and Data Privacy
Activity: Drag and Drop
5.6 AI-Driven Threat Detection and Anomaly Detection
5.7 Adaptive Defense Mechanisms and AI for Incident Response
5.8 Case Studies
Activity: Scenario
5.9 Cybersecurity AI and Threat Intelligence
5.10 Predictive Analytics, AI-Driven Automation, and Continuous Learning
5.10.1 Threat Hunting and Prediction Using OSINT, Threat Intelligence, and Machine Learning
Activity: True or False
5.11 Application in Intrusion Detection
5.12 Malware Detection and Phishing Detection
5.12.1 AI-Powered IDS/IPS with Snort and Machine Learning for Anomaly Detection
5.13 Case Study
Activity: Sequence
Activity: Let's Check your Knowledge
Quiz
Lab Practice 5.1
Lab Practice 5.2
Labs Manual For Module 5
Module 6: Python Programming Fundamentals
Module 6: Python Programming Fundamentals
Audio Book: Python Programming Fundamentals
Podcast: Python Programming Fundamentals
6.1 Python Basics: Control Structures and Functions
6.2 Error Handling
6.3 Basic Input/Output
Activity: Pick One
6.4 Understanding of Python Libraries
Activity: Hotspot
6.5 Socket Programming
6.6 Cryptography
6.7 Parsing Network Traffic
6.8 Log Analysis
6.9 Web Scraping
Activity: Tab
6.10 Automating Tasks with Python and Integration with Security Tools
6.11 Incident Response Automation and Custom Security Tools
Activity: Flip Card
6.12 Data Import, Export, Cleaning and Transformation
6.13 Statistical Analysis and Visualization
6.13.1 AI-Based Malware Signature Generation
Activity: Quiz
6.14 Custom Scanners
6.15 Brute Force Tools
6.16 Keyloggers
6.17 Forensics Tools
6.18 Malware Analysis
Activity: Case Study
Activity: Let's Check your Knowledge
Quiz
Lab Practice 6.1
Labs Manual For Module 6
Module 7: Applications of AI in Cybersecurity
Module 7: Applications of AI in Cybersecurity
Audio Book: Applications of AI in Cybersecurity
Podcast: Applications of AI in Cybersecurity
7.1 Understanding the Application of ML in Cybersecurity
Activity: Text Entry
7.2 Anomaly Detection Techniques
7.3 Behavior Analysis and Real-Time Monitoring
7.4 Case Studies, Tools and Frameworks
Activity: True or False
7.5 Dynamic and Proactive Defense using ML
Activity: Drag and Drop
7.6 Utilizing ML for Email Threat Detection
7.7 Case Studies
Activity: Chronological
7.8 Phishing Detection
7.9 Education, Automation, and Simulation
Activity: Multiple Choice
7.10 Email Threat Landscape and AI Algorithms for Threat Identification
7.11 Automated Response Mechanisms and Continuous Learning
7.11.1 AI-Powered Threat Intelligence Using Open Source Data
7.12 Case Studies
Activity: Scenario
7.13 Employing Advanced Algorithms and AI in Malware Threat Detection
7.14 Case Studies
Activity: Carousel
7.15 Identifying, Analyzing, and Mitigating Malicious Software
7.16 Automated Remediation and Case Studies
Activity: Case Study
7.17 Enhancing User Authentication with AI Techniques
7.18 Case Studies
Activity: Multiple Choice
7.19 Penetration Testing with AI
7.20 Case Studies
Activity: Numeric
Activity: Let's Check your Knowledge
Quiz
Lab Practice 7.1
Labs Manual For Module 7
Module 8: Incident Response and Disaster Recovery
Module 8: Incident Response and Disaster Recovery
Audio Book: Incident Response and Disaster Recovery
Podcast: Incident Response and Disaster Recovery
8.1 Incident Response Process (Identification, Containment, Eradication, Recovery)
Activity: Text Entry
8.2 Incident Response Lifecycle
Activity: Flip Card
8.3 Developing the Plan and Defining Roles
8.4 Communication Protocols
8.5 Resource Allocation, Testing, and Drills
Activity: Tab
8.6 Incident Detection Tools and Analysis Techniques
8.7 Incident Classification and Evidence Collection
Activity: Accordian
8.8 Post-Incident Activities
Activity: Quiz
8.9 Digital Forensics and Evidence Collection Techniques
8.10 Chain of Custody
8.11 Forensic Tools, Techniques, and Legal Considerations
Activity: Text Entry
8.12 Disaster Recovery Planning
8.13 Backup Strategies
8.14 Business Continuity Planning
8.15 Testing and Drills
8.16 Plan Maintenance
Activity: Case Study
8.17 Penetration Testing and Vulnerability Assessments
Activity: Sequence
8.18 Legal and Regulatory Considerations of Security Incidents
Activity: Case Study
Activity: Let's Check your Knowledge
Quiz
Module 9: Open-Source Security Tools
Module 9: Open Source Security Tools
Audio Book: Open-Source Security Tools
Podcast: Open-Source Security Tools
9.1 Introduction to Open-Source Security Tools
Activity: Scenario
9.2 Wireshark
9.3 Nmap
9.4 Snort
9.5 Metasploit
9.6 OSSEC
Activity: Drag and Drop
9.7 Implementing Open-Source Solutions in Organizations
9.8 Case Studies
Activity: Multiple Choice
9.9 Community Support and Resources
Activity: True or False
9.10 Nmap, OpenVAS, and Nessus
9.11 Nikto and VulnHub
Activity: Sequence
9.12 SIEM Tools (Open-Source options)
Activity: Text Entry
9.13 Open-Source Packet Filtering Firewalls
Activity: Text Entry
9.14 Hashcat and John the Ripper
9.15 Cain and Abel
9.16 Hydra and Ophcrack
Activity: Multiple Choice
9.17 Autopsy and Sleuth Kit
9.18 Volatility, Plaso, and X1 Search
Activity: True or False
Activity: Let's Check your Knowledge
Quiz
Module 10: Securing the Future
Module 10: Securing the Future
Audio Book: Securing the Future
Podcast: Securing the Future
10.1 Emerging Cyber Threats and Trends
Activity: Text Entry
10.2 Blockchain in Cybersecurity
10.3 Real-World Examples
Activity: True or False
10.4 IoT and Network Security
10.5 Case Studies and Best Practices
Activity: Multiple Choice
10.6 Cloud Computing and Security Risks
10.7 Case Studies and Best Practices
10.7.1 AI-Based Denial of Service (DoS) Attack Detection
Activity: Hotspot
10.8 Quantum Computing and Threats to Cryptography
10.8.1 DDoS Attack Detection with Wireshark Packet Analysis and LSTM Neural Networks or any Statistical Methods.
Activity: Chronological
10.9 Case Studies and Best Practices
Activity: Case Study
10.10. Cryptography and Secure Hashing
10.11 Symmetric and Asymmetric Encryption
10.12 Secure Hash Functions and Cryptographic Protocol
Activity: Sequence
10.13 Cybersecurity Awareness and Training for Users
Activity: Multiple Choice
10.14 Continuous Security Monitoring and Improvement
Activity: True or False
Activity: Let's Check your Knowledge
Quiz
Lab Practice 10.1
Lab Practice 10.2
Labs Manual For Module 10
Module 11: Capstone Project
Module 11: Capstone Project
Audio Book: Capstone Project
Podcast: Capstone Project
11.1 Capstone Project: Scope, Project Phases, and Outcome Presentation
Activity: Fill in the Blank
Activity: True or False
11.2 Use Cases: AI in Cybersecurity
Activity: Multiple Choice
Activity: Let's Check your Knowledge
Quiz
Additional Module - AI Agents For Security Level 1
AI Agents Security Level 1
1.1 AI Agents and Their Key Capabilities in Cybersecurity
1.2 How AI Agents Work and Their Core Characteristics
1.3 Types of AI Agents
1.4 Case Study: Darktrace's Antigena – Autonomous Cyber Defense
Activity: Interactive Quiz/Activity- Carousel
Activity: Graded Assessment- 5 Questions
Resources
AI+ Security Level 1 Blueprint
AI+ Security Level 1 Detailed Curriculum
AI+ Security Level 1 Tools
AI+ Security Level 1 Resources and References
AI CERTs Exam Guidelines
AI CERTs Exam Guidelines
AI+ Security Level 1 Examination
AI+ Security Level 1 Examination
View Certification
Feedback Survey Form
Survey
Next
Side panel
Categories
All categories
AI CERTs
AI CERTs/Test
AI CERTs- LAN
AICERTs- Extended E-Learnin...
AICERTs- Extended E-Learnin...
AI CERTs-Spanish
ANAB
MS ELearning
Other Category
Other Category - LAN
Eduman
MS Elearning - Russel
V3 - Russel
AICERTs- Extended E-Learnin...
Russian Course
Qazaq Course
AI CERTs - Arabic
AI CERTs - French
Agent X
AI CERTs - Bengali
AI CERTs - Portuguese
ATP
AI CERTs - Chinese
AI CERTs - Azerbaijani
AI CERTs - Turkish
AI CERTs - German
AI CERTs - Indonesian
CFF
Self Paced Vimeo
AI CERTs - Italic
Home
Store
Store
Contact Us
Watch Demo
Log in
Categories
Collapse
Expand
All categories
AI CERTs
AI CERTs/Test
AI CERTs- LAN
AICERTs- Extended E-Learnin...
AICERTs- Extended E-Learnin...
AI CERTs-Spanish
ANAB
MS ELearning
Other Category
Other Category - LAN
Eduman
MS Elearning - Russel
V3 - Russel
AICERTs- Extended E-Learnin...
Russian Course
Qazaq Course
AI CERTs - Arabic
AI CERTs - French
Agent X
AI CERTs - Bengali
AI CERTs - Portuguese
ATP
AI CERTs - Chinese
AI CERTs - Azerbaijani
AI CERTs - Turkish
AI CERTs - German
AI CERTs - Indonesian
CFF
Self Paced Vimeo
AI CERTs - Italic
Home
Store
Store
Contact Us
Watch Demo
Open course index
Course info
AI+ Security Level 1™
Grade
Certificate
Certificate Download
Certificate Sharing