Live On-Site / Live Virtual
This intensive course guides you from the foundations of artificial intelligence, machine learning, and neural networks into the world of large language models and transformers. You will explore how AI and LLMs can be weaponized and defended. Through immersive labs, you will train models, build LLM applications, and simulate real red team attacks. Along the way, you will develop a deep understanding of sampling, prompting, embeddings, and attention.
By the end of the course you will have practical code, projects, and security tools that are directly applicable to your professional work.
Practical AI Security: Attacks, Defenses, and Applications is a comprehensive course built for developers and cybersecurity professionals who want to get up to speed on the fast-moving world of AI and security. Instead of staying high-level, it takes you step by step from the basics of machine learning to advanced offensive and defensive techniques involving Large Language Models (LLMs). By the end, you’ll know how to use AI as part of your security toolkit, while also spotting and defending against the new risks it brings.
The course starts with the essentials of AI and machine learning. You’ll learn the differences between AI, Machine Learning, and Deep Learning, and then actually train models yourself. With practical labs using tools like Scikit-Learn, you’ll get comfortable with concepts like supervised vs. unsupervised learning, neural networks, bias, and overfitting. This way you’ll know how AI works under the hood before jumping into security-specific applications.
From there, we’ll dig into how modern generative AI systems are built, focusing on LLMs. You’ll learn the core ideas behind tokenization, context windows, and the Transformer architecture that drives models like GPT. Through exercises, you’ll practice prompt engineering, tweak parameters like temperature and top-p to control outputs, and use embeddings with vector databases such as FAISS for semantic search. You’ll even get to build and deploy simple LLM-based web apps.
Once you’ve got the fundamentals down, we’ll move onto some real security applications. On the offensive side, you’ll explore how AI can be used for things like automated pentesting agents, vulnerability discovery, and exploit development. We’ll look at research projects like Google’s Project Naptime and review tools already used by red teams. On the defensive side, you’ll see how AI can help with threat modeling, automated code reviews, and security-focused retrieval systems for documentation and CVE databases.
Finally, the course zeroes in on the security of AI systems themselves. You’ll experiment with prompt injection attacks, denial-of-service techniques, and data exfiltration against AI agents, looking at real-world issues in systems like LangChain, GitHub Copilot, and ChatGPT. Then, you’ll learn how to defend against these attacks by building guardrails, applying frameworks like Google’s SAIF, and adapting red teaming approaches to generative AI.
By attending this course , you will get
2 Days
This course is ideal for anyone interested in learning about the application of AI in cybersecurity.
Detailed Course Setup instructions and Slack access will be sent a few weeks prior to the class
Need a Template to Justify the Training Request to your Manager? Download the Template below
To successfully participate in this course, attendees should possess the following:
Our trainers boast more than ten years of experience delivering diverse training sessions at conferences such as Blackhat, HITB, Power of Community, Zer0con, OWASP Appsec, and more.
GET IN TOUCH FOR PRICING
GET IN TOUCH FOR PRICING
Our Live Virtual and On-Site sessions replicate the interactive classroom experience, fostering real-time collaboration and engagement among participants.
No, the training that you purchase from 8kSec, including the course materials is exclusively for your individual use. You may not reproduce, distribute or display (post/upload) lecture notes, or recordings, or course materials in any other way — whether or not a fee is charged – without the express written consent of 8kSec.
For On-Site/Virtual Courses during private trainings/conferences, we provide a customized certificate after the completion of the course. Please note that the Certificate of Course Completion is different from the one obtained after clearning the Certification exam.
For Virtual/Live Trainings, we will provide you access to our Lab environment and an instruction guide during the training.
You can find our Training Schedule at https://8ksec.io/public-training/. To schedule a Live Virtual or Live On-site private training for a group of 5+ attendees, email trainings@8ksec.io and our logistics team will get in touch with you to organize one.
The information on this page is subject to change without notice.
Please share with us the project requirements and the goals you want to achieve, and one of our sales representatives will contact you within one business day.
51 Pleasant St # 843, Malden, MA, Middlesex, US, 02148
contact@8ksec.io
trainings@8ksec.io
press@8ksec.io
+1(347)-4772-006
Get the latest news & updates
© 2025 8kSec LLC All Right Reserved