AI is changing both sides of the security equation. This course covers how to use AI to defend — and how attackers are using it against you. Both sides of the equation, in 5 days.
Free forever · No credit card · No spam
AI is changing the threat landscape faster than any previous technology shift. This course covers what's actually happening in 2026, not what was in the CISSP study guide three years ago.
You'll understand both sides — how AI helps defenders detect threats faster, and how attackers are using AI to evade detection. Both matter.
Day 3 puts you in the SOC. You'll write Python to send log data to Claude and get natural-language threat assessments back — a skill you can use Monday morning.
Prompt injection, data poisoning, model inversion — the new attack surface AI creates. Know what to defend before it hits your org.
Defense techniques, operational tools, and the new risks AI itself introduces.
The state of AI in security: how defenders are using it, how attackers are using it, and why the stakes are higher than ever. Conceptual foundation with real 2026 examples.
How ML-powered anomaly detection works, why it catches things rule-based systems miss, and how to think about building or evaluating AI threat detection systems.
Hands-on: write Python that sends log files to Claude, asks it to identify suspicious patterns, and generates an incident summary. A real SOC analyst tool in 50 lines.
Use Claude to review code for security vulnerabilities, compare it to traditional SAST tools, and understand where AI code review excels and where it has blind spots.
The new attack surface AI creates. Prompt injection in production, data poisoning in training pipelines, model inversion attacks, and adversarial examples. How to defend against each.
Enter your email and we'll remind you as new lessons drop.
Free forever. No credit card. Unsubscribe anytime.
The ability to evaluate AI security tools, brief leadership on AI risks, and make architectural decisions requires more than reading — it requires practice. That's what the live bootcamp delivers.
Basic familiarity with security concepts (what a firewall is, what a log file is) helps, but we explain everything. Day 1 is designed to work for people new to security as well as veterans.
Day 3 has Python code. You can follow along by running the provided code even if you don't write Python yourself. Days 1, 2, 4, and 5 are concept and analysis focused — no coding required.
Yes. All 5 days forever. No paywall, no credit card.
60–80 minutes per day. Self-paced — no deadlines.