Course : Artificial intelligence and operational safety

AI as a field of possibilities for malicious acts

Synthesis course - 1d - 7h00 - Ref. ICY
Price : 850 € E.T.

Artificial intelligence and operational safety

AI as a field of possibilities for malicious acts



This training course will help you understand what artificial intelligence (AI) is, how to define it in the context of cybersecurity, the importance of securing our connected objects, our identities, our personal data, etc., and the importance of operational security.


INTER
IN-HOUSE
CUSTOM

Synthesis course in person or remote class
Disponible en anglais, à la demande

Ref. ICY
  1d - 7h00
850 € E.T.




This training course will help you understand what artificial intelligence (AI) is, how to define it in the context of cybersecurity, the importance of securing our connected objects, our identities, our personal data, etc., and the importance of operational security.


Teaching objectives
At the end of the training, the participant will be able to:
Understanding how artificial intelligence can benefit cybersecurity
Understanding security issues related to connected objects
Discover the tools and means for detecting social engineering, biometric and spoofing attacks...

Intended audience
Decision-makers, project managers, engineers, developers, researchers.

Prerequisites
Previous knowledge of a computer language and a programming language.

Course schedule

1
Defining the challenges between AI, robotics and cybersecurity

  • Definition and concepts.
  • Challenges for governments, armies and all IT-related organizations.
  • AI-related cybersecurity opportunities and limits.
  • Software threats. Malware detection tools.
  • Security issues related to the Internet of Things (IoT).
  • Possibilities and limits of the IoT in a cybersecurity context.
  • Malicious connected objects versus means of detection.
Demonstration
Demonstrations: polymorphic software, genetic algorithms for polymorphic code generation, electronic and robotic hardware.

2
Social engineering and artificial intelligence

  • What is a social engineering attack? What are the consequences?
  • Principles of "deepfakes" (false identities, images, voices and videos).
  • Possibilities and limits of a GAN (Generative Adversarial Networks).
  • New detection tools
Demonstration
Implementation of a GAN network to produce images with dummy styles.

3
AI as a tool for detection, protection, surveillance, identification...

  • Systems of ever-increasing "complexity".
  • Statistical indicators "classic" are insufficient to monitor a complex system.
  • Machine learning (ML) and deep learning (DP) for anomaly detection and prevention.
  • AI as a surveillance tool. Use of ML and DL by biometric systems.
  • Possibilities and limits of ML and DL in person identification.
  • Misuse: false positives, false negatives, malicious acts...
Demonstration
Detection model. Camera typology (360, HD, 3D-RGBd...). Demonstrations of the limitations, "biases" linked to AI and cases where AI is more effective than the human eye.

4
AI-powered listening

  • Eavesdropping context "boosted" with artificial intelligence.
  • Tools and resources for eavesdropping on a conversation, detecting a secret code, reconstructing an e-mail...
  • Successful projects accessible to all.
  • How can we preserve the confidentiality of our exchanges?
  • Possibilities and limits between "frappology" and AI. How to protect yourself?
Demonstration
Tools and research useful for reconstructing and predicting indirect signals in a noisy environment.


Customer reviews
4,1 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
VICTOR D.
17/12/25
5 / 5

Très bien. Le temps passé à chaque sujet est un peu court, mais c’est normal pour pouvoir passer en revue tous les sujets.
FABRICE C.
17/12/25
5 / 5

Mon appréciation sur le contenu et la pédagogie est très satisfaisant.
EMMANUEL S.
17/12/25
4 / 5

Bonne introduction à l’IA et à la sécurité opérationnelle. Un temps plus important sur la description technique des différents moteur d’IA aurait été apprécié.