When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 4 modules in this course
In "Introduction to AI for Cybersecurity," you'll gain foundational knowledge of how artificial intelligence (AI) is transforming the field of cybersecurity. This course covers key AI techniques and how they can be applied to enhance security measures, detect threats, and secure digital systems. Learners will explore hands-on implementations of AI models using tools like Jupyter Notebooks, allowing them to detect spam, phishing emails, and secure user authentication using biometric solutions.
What makes this course unique is its focus on real-world applications, blending AI theory with practical skills relevant to today's cybersecurity challenges. By the end of the course, you'll have developed the ability to use AI to address cyber threats such as email fraud and fake logins, and will be equipped with practical skills to protect digital assets in a rapidly evolving technological landscape.
Whether you're a cybersecurity professional or someone seeking to expand your skills in AI, this course provides a critical understanding of how AI can be leveraged to mitigate security risks and keep systems secure.
This course will guide you through the ML development process and its vital applications in combating cyber threats. We’ll explore the challenges posed by technological advancements, examine AI’s role in spam filtering and email threat detection, and implement key algorithms like decision trees and Naïve Bayes. Additionally, you’ll learn how biometric solutions, such as keystroke dynamics and facial recognition, can enhance user authentication security.
What's included
2 readings
Show info about module content
2 readings•Total 12 minutes
Course Overview•10 minutes
Instructor Biography - Lanier Watkins•2 minutes
AI for Cybersecurity Professionals
Module 2•3 hours to complete
Module details
In this module, we will discuss the background of artificial intelligence (AI) and provide a brief overview. Also, in this module and every module, we will take a hands-on approach to learning how to use AI for cybersecurity.
What's included
2 videos3 readings3 assignments
Show info about module content
2 videos•Total 17 minutes
Artificial Intelligence Background and Overview•10 minutes
A Hands-On Look at Several Machine Learning Algorithms•7 minutes
3 readings•Total 70 minutes
Reading References•15 minutes
Reading References•15 minutes
Self-Reflective Reading: Hands-On ML Examples and Development Process•40 minutes
3 assignments•Total 90 minutes
Introduction to Artificial Intelligence for Cybersecurity•15 minutes
Practical Machine Learning Algorithms for Cybersecurity•15 minutes
AI for Cybersecurity Professionals•60 minutes
Ham or Spam? Detecting Email Cybersecurity Threats with AI
Module 3•3 hours to complete
Module details
In this module, we shall discuss the detection of email threats using AI. Also, we will implement hands-on examples of the use of various ML techniques to detect email threats such as perceptron for spam filtering, support vector machine for spam filtering, regression and decision tree algorithms for spam filtering, and the use of Naïve Bayes ML algorithm and natural language processing for spam filtering.
What's included
5 videos3 readings3 assignments
Show info about module content
5 videos•Total 15 minutes
Detecting Email Cyber Threats with AI•4 minutes
Perceptron Spam Filter Example•2 minutes
Support Vector Machine (SVM) Spam Filter Example•3 minutes
Phishing Detection with Regression and Trees•4 minutes
Naive Bayes Spam Filter Example•1 minute
3 readings•Total 70 minutes
Reading References•15 minutes
Reading References•15 minutes
Self-Reflective Reading: Bridging Theory and Practice in Cybersecurity•40 minutes
3 assignments•Total 90 minutes
AI Techniques for Detecting Email Threats•15 minutes
Advanced Spam Filtering Methods and Phishing Detection•15 minutes
Ham or Spam? Detecting Email Cybersecurity Threats with AI•60 minutes
Securing User Authentication
Module 4•4 hours to complete
Module details
In this module, we will discuss the background of threats against user authentication. Also, we will explore hands-on implementations of fake login detection analytics using biometrics.
What's included
2 videos3 readings3 assignments1 ungraded lab
Show info about module content
2 videos•Total 12 minutes
Securing User Authentication•5 minutes
Keystroke and Facial Recognition Biometric Authentication•6 minutes
3 readings•Total 70 minutes
Reading References•15 minutes
Reading References•15 minutes
Self-Reflective Reading: Authentication is Paramount•40 minutes
3 assignments•Total 90 minutes
Understanding and Securing User Authentication Threats•15 minutes
Implementing Biometric Solutions: Keystroke and Facial Recognition•15 minutes
Securing User Authentication •60 minutes
1 ungraded lab•Total 60 minutes
Practice Lab: Detecting IoT Malware Behavior in Network Traffic•60 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
The mission of The Johns Hopkins University is to educate its students and cultivate their capacity for life-long learning, to foster independent and original research, and to bring the benefits of discovery to the world.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.