Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Impact of Generative AI on Cyber Security
Training Overview
Description of Training
Introduction to Generative AI and Cybersecurity Transformation
Understanding Generative AI (9:35)
Real-world examples (5:39)
The Role of Thought Leaders in Driving Innovation and Adoption (4:58)
Cyber Security 2024 Forecast (1:46)
Generative AI Security Risks
Identifying the Unique Security Risks Posed by Generative AI (5:19)
Adversarial attacks and model manipulation (3:37)
Exploring case studies of generative AI-related cyber threats (5:03)
Module 3 - Transforming the Cybersecurity Industry
Predictions and Insights on How Generative AI (4:26)
Anticipated advancements and challenges in the near future (5:24)
The changing landscape of AI-powered cyber defense (7:11)
Module 4 - Defensive Mechanisms and Best Practices
Understanding the state-of-the-art defensive mechanisms against generative AI (1:28)
Automated Threat Detection and Response (5:00)
Cyber Attack Simulations (3:48)
Predictive Analysis (4:14)
Phishing Detection and Deepfake Identification (3:44)
Access Controls (3:17)
Proactive strategies for mitigating security risks (4:52)
Leveraging generative AI for cyber defense and anomaly detection (3:50)
Module 5 - Future Trends in Generative AI Cybersecurity
Exploring emerging trends and research directions (0:50)
AI Powered Cyber Security (3:43)
Quantum-Safe Encryption (3:16)
Cybersecurity in the Internet of Things (IoT) Era (3:02)
Cyber-Physical System Security (3:11)
Privacy-Preserving Technologies (2:58)
The Ethics of AI (0:56)
The intersection of Generative AI with other Cybersecurity Technologies (4:49)
Enhancing block chain security (3:39)
IOT Security (4:16)
Intelligent Cyber Threat Hunting (3:59)
Behavioral-Based Authentication (3:54)
Ethical considerations and responsible AI practices in cybersecurity (1:37)
The Ethics of AI-Powered Cyber Defense (3:52)
Importance of transparent AI algorithms in cybersecurity (3:17)
Ensuring Data Privacy (3:01)
Accountability and Human Oversight (2:39)
Ethical AI Development and Deployment (2:44)
Preparing for the Future
What companies should do today (5:25)
Building a culture of continuous learning and innovation (4:03)
Collaborative strategies for knowledge-sharing (2:43)
Learning links & Resources
How AI can improve the future of cyber security
IBM AI Policy
Microsoft AI principles
Google's AI Principles
A Practical Guide to Building Ethical AI
Thank You Note
Thank You (0:41)
Jan 2024 Update - Adversarial Threat Landscape for AI Systems
Introduction to ATLAS and its significance in AI security (0:45)
How ATLAS complements the MITRE ATT&CK Framework (1:49)
An overview of the threats and risks associated with AI systems (5:09)
ATLAS MITRE Framework - An Overview (5:09)
ATLAS MITRE Navigator (3:58)
ATLAS MITRE - CASE Studies (2:07)
Audio Version of Training
Audio Download
Cyber Attack Simulations
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock