糖心vlog官网观看

Macquarie University

Cyber Security: Security of AI

This course is part of multiple programs.

Matt Bushby

Instructor: Matt Bushby

Included with 糖心vlog官网观看 Plus

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Identify emerging threats targeting AI systems and applications.

  • Apply defences to protect AI from adversarial attacks and model leakage.

  • Evaluate AI security controls, testing methods, and trade-offs.

  • Understand regulation, responsible AI principles, and future risks.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

July 2025

Assessments

12 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is available as part of
When you enroll in this course, you'll also be asked to select a specific program.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 6 modules in this course

Artificial Intelligence (AI) is revolutionising industries across the globe, but it鈥檚 also introducing a rapidly evolving set of cybersecurity threats. As AI systems become more complex and deeply embedded in everyday operations, understanding their foundational principles and emergent risks is essential. In this topic, you鈥檒l explore the fundamentals of AI, what it is, how it works, and how it鈥檚 being applied across sectors. You鈥檒l learn the difference between engineering-driven AI systems and deep learning models, and how each introduces unique security considerations. From there, we shift focus to the new and emerging threat landscape: adversarial AI, model manipulation, deepfakes, AI-driven scams, and the weaponisation of AI for misinformation. You鈥檒l build an essential foundation in both traditional security frameworks and AI-specific risks, setting the stage for deeper exploration of securing AI applications throughout the rest of the course. Get ready to explore the frontline of AI security challenges, and understand the urgency of building trusted, robust, and defensible AI systems.

What's included

2 assignments8 plugins

As AI becomes increasingly integrated into critical infrastructure and industrial systems, it brings with it new layers of complexity, and new avenues for attack. In this topic, you鈥檒l explore how Artificial Intelligence is reshaping the security landscape of Industrial Control Systems (ICS) and Operational Technology (OT), and what this means for defenders working in high-risk, high-impact environments. We begin by examining how AI is applied in ICS and OT, enhancing operational efficiency, automation, and predictive maintenance. But with innovation comes risk: AI introduces novel vulnerabilities, from AI-driven manipulation of cyber-physical systems to emerging attack vectors in critical infrastructure such as energy grids and manufacturing lines. Through real-world case studies, you鈥檒l investigate how adversaries exploit AI in industrial environments and how traditional OpSec and DevSecOps practices must be adapted to secure AI-enabled deployments. You'll also learn how to identify sensitive components within AI pipelines and apply context-specific defences based on sector, whether in military-grade applications, industrial settings, or consumer products. AI is powering the future of industry. Here, you鈥檒l learn how to defend it.

What's included

2 assignments6 plugins

As AI systems transition from experimental models to real-world deployment, their exposure to adversarial threats and misuse increases dramatically. In this topic, we鈥檒l explore how AI is being attacked and exploited in practice, and why securing these systems is now a critical focus for cyber professionals. You鈥檒l dive into the mechanics of AI-specific attack vectors such as model poisoning, information leakage, model stealing, and backdoor exploits. These threats not only compromise the performance of AI models, but also pose serious risks to data privacy, intellectual property, and user safety. We鈥檒l also examine the implications of harmful AI outputs, whether they arise from poorly aligned models, biased training data, or deliberate manipulation. You鈥檒l learn how challenges such as output alignment, ethical censorship, and AI-powered surveillance affect both public trust and legal compliance. By analysing real-world case studies and scenarios, this topic will sharpen your ability to identify vulnerabilities in AI systems and understand the broader societal consequences of insecure deployments. AI is already shaping the world, this topic helps ensure it does so securely and responsibly.

What's included

2 assignments6 plugins

As AI systems become more powerful and integrated into critical operations, defending them against emerging threats is no longer optional, it鈥檚 mission-critical. In this topic, you鈥檒l explore the technical controls and testing strategies used to secure AI models and protect them from compromise. You鈥檒l learn how to apply AI-specific defences, from secure algorithm design to privacy-preserving techniques like differential privacy. You鈥檒l also examine how to test and validate the robustness of AI models using red, purple, and blue teaming approaches. With a focus on balancing security, utility, and performance, this topic empowers you to make informed trade-offs in high-stakes environments. Whether you鈥檙e building or auditing AI systems, you鈥檒l gain the practical skills needed to implement trusted controls and rigorously test for resilience against real-world threats.

What's included

2 assignments8 plugins

As AI systems grow in influence and complexity, so too does the imperative to ensure they are designed, deployed, and governed responsibly. This topic introduces the foundational principles of Responsible AI, covering fairness, bias mitigation, transparency, and ethical accountability. You鈥檒l explore how AI decisions can impact individuals and communities, and how to navigate trade-offs between user privacy, model performance, and transparency. Key challenges such as data sourcing, labelling, and the ethical implications of large-scale models will be unpacked, alongside practical strategies for enhancing trust in AI systems. We鈥檒l also dive into global frameworks, policies, and governance models that support secure and ethical AI adoption, equipping you with the knowledge to ensure AI systems are not only functional, but fair, transparent, and aligned with regulatory expectations.

What's included

2 assignments6 plugins

AI is evolving rapidly, and with it, the scope and complexity of its security challenges. In this final topic, we turn our attention to the road ahead: examining how emerging applications and architectures will shape the next frontier of AI security. You鈥檒l explore speculative but increasingly plausible uses of AI in sectors like healthcare, autonomous vehicles, and programming, unpacking the unique risks each use case presents. We鈥檒l also introduce Artificial General Intelligence (AGI), examining its transformative potential alongside the profound security and ethical implications it may carry. From lightweight AI models for constrained devices to philosophical perspectives on security trade-offs, this topic encourages you to think critically and proactively. The goal: to equip you with the insight and foresight needed to anticipate future risks, influence responsible innovation, and contribute to the safe evolution of intelligent systems.

What's included

1 reading2 assignments7 plugins

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
14 Courses6,491 learners

Offered by

Explore more from Computer Security and Networks

Why people choose 糖心vlog官网观看 for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, 糖心vlog官网观看 is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. 糖心vlog官网观看 allows me to learn without limits."
糖心vlog官网观看 Plus

Open new doors with 糖心vlog官网观看 Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose 糖心vlog官网观看 for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

More questions