Offensive and Defensive Security with AI
Become professional in using AI and LLM for offensive and defensive security tasks in your organization.
Target Audience
- Security Engineers
- Security Analysts
- Red Team members
- Blue Team members
- Anyone interested in learning how to use AI for offensive security purposes
- Anyone interested in learning how to use AI for defensive security purposes
Course Objectives
This course will teach you how to utilize AI for both offensive and defensive security tasks.
What you will be able to perform after attending the class?
You will have a solid understanding how AI and modern LLMs can help you performing your day-to-day job and to speed up processes significantly.
Handouts
All students will receive the all presented slides in PDF format along with a lot of web resources and links for further studies.
The instructor
Your instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He recently became one of the first folks worldwide to become a Certified AI/ML Pentester (C-AI/MLPen). He works as a consultant for a big tech company and engages in Bug Bounty programs where he found hundreds of critical and high vulnerabilities.
What are the requirements or prerequisites for taking your course?
- Basic IT Skills
- Basic understanding of web technology
- No Linux, programming or hacking knowledge required
- Computer with a minimum of 4GB ram/memory
- Operating System: Windows / Apple Mac OS / Linux
- Reliable internet connection
- Firefox Web Browser
- Burp Suite (optional)
Course outline:
This course has a both theory and practical lab sections with a focus on utilizing AI/LLM for both offensive and defensive purposes.
- What is AI and LLM?
- Learning process
- Application and the future
- Development cycle
- Tokenization
- suggested models
- uncensored models
- Run locally and privately
- Ollama and GUI
- jan.ai and LM Studio
- Huggingface
- RAG
- Jailbreaking
- System Prompts
- Prompt Engineering
- Temperature and TopP
- Playgrounds
- Python Code
- Reverse Engineering Prompts
- Yolo Tool
- Fabric Framework
- Create your own bots for Offensive Security
- Phishing, Vulnerability Management, Exploit development, Malware obfuscation, Tool Development, JS Analysis, Enumeration, Attacks and Payloads, HDI, Red Teaming
- AI Burp extensions
- Pentest GPT
- Create your own bots for Defensive Security
- SOC duties, Threat Intel, Threat Hunting, Digital Forensics, Incident Response, Security Architecture, Cloud and Data Analysis
Next Dates
Online at any time