糖心vlog官网观看

Early bird sale! Unlock 10,000+ courses from Google, IBM, and more for 50% off. Save today.

Macquarie University

AI for Cyber Security

Matt Bushby

Instructor: Matt Bushby

Included with 糖心vlog官网观看 Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Detect Cyber Threats Using Machine Learning

  • How Attackers Bypass AI Systems鈥攁nd How to Defend

  • Build, Train, and Evaluate ML Models for Cyber

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

June 2025

Assessments

5 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 5 modules in this course

Artificial Intelligence (AI) and Machine Learning (ML) are transforming the way we defend against cyber threats鈥攐ffering the power to detect patterns, respond to anomalies, and adapt to evolving risks at machine speed. But with great capability comes complexity and new vulnerabilities. In this module, you鈥檒l build a strong foundation in AI and ML, tailored specifically for cyber security applications. You鈥檒l explore the core concepts behind machine learning鈥攈ow models are trained, what types of learning exist, and how we measure their accuracy and effectiveness. But you鈥檒l also look under the hood at the darker side of AI: the ways attackers can exploit ML systems through inference, poisoning, and adversarial input. By the end of this module, you'll not only understand how ML can support cyber defence, but also the new attack surfaces it introduces鈥攁nd how to critically evaluate its strengths, weaknesses, and limitations in the real world.

What's included

1 assignment10 plugins

Machine Learning isn鈥檛 just a buzzword鈥攊t鈥檚 a powerful tool already being used to combat some of the most pressing cyber threats facing businesses today. In this topic, you鈥檒l go beyond theory and get hands-on with ML techniques that are shaping the future of cyber defence. From detecting malware to identifying anomalies in network traffic and uncovering fraud, you鈥檒l explore how ML models are applied across real-world cyber security use cases. Learn how to load, view, and preprocess datasets, then train and test classification and regression models using practical tools and workflows. This is where AI gets real. You鈥檒l see firsthand how algorithms can help automate threat detection, accelerate response, and augment human judgement in high-stakes environments. By the end of this module, you鈥檒l be equipped to run your own ML models on cyber datasets鈥攗nlocking new levels of insight and readiness.

What's included

1 assignment9 plugins

Modern cyber attacks often travel through the digital veins of an organisation鈥攊ts networks. In this topic, you'll uncover how Machine Learning can serve as a powerful diagnostic tool, capable of identifying unusual patterns and detecting threats hiding in plain sight. You鈥檒l explore the foundations of malware鈥攆rom binaries to behavioural types鈥攁nd how ML models can analyse and interpret network traffic to flag anomalies in real-time. Through practical exercises, you'll work with malware datasets and apply machine learning algorithms, including artificial neural networks, to spot and classify malicious behaviour before it causes harm. By mastering these techniques, you鈥檒l develop the skills to create intelligent defence mechanisms that continuously learn from evolving threats鈥攑ushing your cyber resilience far beyond static rule-based systems.

What's included

1 assignment7 plugins

Cyber attackers are constantly evolving, often slipping past traditional defences by mimicking normal traffic patterns. In this topic, you鈥檒l learn how machine learning transforms anomaly detection鈥攅nabling you to spot the subtle signals of compromise before damage is done. You鈥檒l explore foundational techniques such as K-Nearest Neighbours (KNN) and One-Class Support Vector Machines (SVM), applying them to real-world network logs to detect outliers and distinguish between legitimate and malicious traffic. Through hands-on experimentation, you鈥檒l gain experience in building models that can automatically identify abnormal behaviours in networks鈥攏o predefined rules required. By the end of this module, you'll be equipped to use machine learning for advanced threat detection, making your organisation鈥檚 defences smarter, faster, and more adaptive.

What's included

1 assignment8 plugins

As machine learning becomes more embedded in cyber defences, so too do the methods for breaking it. In this module, you鈥檒l step into the mind of the adversary to understand how machine learning systems can be manipulated, bypassed, and broken鈥攁nd more importantly, how to defend against it. You鈥檒l explore adversarial machine learning through real-world examples of threat models, adversarial inputs, and poisoning attacks. You鈥檒l learn how seemingly harmless data can be weaponised to compromise models, and how attackers exploit vulnerabilities during both the training and inference phases. But it's not all about offence. This module also dives into the defensive playbook鈥攅quipping you with practical techniques to build more resilient models and implement countermeasures that can withstand these emerging threats. Whether you're deploying ML in malware detection, intrusion systems, or fraud analytics, this module will help you safeguard your models and preserve their trustworthiness in the face of sophisticated attacks.

What's included

1 reading1 assignment6 plugins

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
10 Courses448 learners

Offered by

Explore more from Computer Security and Networks

Why people choose 糖心vlog官网观看 for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, 糖心vlog官网观看 is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. 糖心vlog官网观看 allows me to learn without limits."
糖心vlog官网观看 Plus

Open new doors with 糖心vlog官网观看 Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose 糖心vlog官网观看 for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

More questions