<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="34637" language="de" source="https://portal.flane.ch/swisscom/xml-course/aicerts-aisec" lastchanged="2026-04-01T15:53:11+02:00" parent="https://portal.flane.ch/swisscom/xml-courses"><title>AI+ Security Level 1</title><productcode>AISEC</productcode><vendorcode>AH</vendorcode><vendorname>AI Certs</vendorname><fullproductcode>AH-AISEC</fullproductcode><version>1.0</version><essentials>&lt;ul&gt;
&lt;li&gt;Basic Python Programming: Familiarity with loops, functions, and variables.&lt;/li&gt;&lt;li&gt;Basic Cybersecurity Knowledge: Understanding of CIA triad and common threats (e.g., malware, phishing).&lt;/li&gt;&lt;li&gt;Basic Machine Learning Concepts: Awareness of fundamental machine learning concepts, not mandatory.&lt;/li&gt;&lt;li&gt;Basic Networking: Understanding of IP addressing and TCP/IP protocols.&lt;/li&gt;&lt;li&gt;Linux/Command Line Skills: Ability to navigate and use the CLI effectively.&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;ul&gt;
&lt;li&gt;Cybersecurity Professionals and Analysts&lt;/li&gt;&lt;li&gt;Penetration Testers&lt;/li&gt;&lt;li&gt;Security Consultants&lt;/li&gt;&lt;li&gt;Incident Responders&lt;/li&gt;&lt;li&gt;Security Engineers&lt;/li&gt;&lt;li&gt;Threat Hunters&lt;/li&gt;&lt;li&gt;Compliance Auditors&lt;/li&gt;&lt;li&gt;Network Security Administrators&lt;/li&gt;&lt;li&gt;Forensic Analysts&lt;/li&gt;&lt;li&gt;IT Professionals and System Administrators&lt;/li&gt;&lt;li&gt;Risk Management Specialists&lt;/li&gt;&lt;li&gt;Business Leaders and Decision Makers&lt;/li&gt;&lt;li&gt;Software Developers&lt;/li&gt;&lt;/ul&gt;</audience><outline>&lt;h4&gt;Module 1: Introduction to Cybersecurity&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;1.1 Definition and Scope of Cybersecurity&lt;/li&gt;&lt;li&gt;1.2 Key Cybersecurity Concepts&lt;/li&gt;&lt;li&gt;1.3 CIA Triad (Confidentiality, Integrity, Availability)&lt;/li&gt;&lt;li&gt;1.4 Cybersecurity Frameworks and Standards (NIST, ISO/IEC 27001)&lt;/li&gt;&lt;li&gt;1.5 Cyber Security Laws and Regulations (e.g., GDPR, HIPAA)&lt;/li&gt;&lt;li&gt;1.6 Importance of Cybersecurity in Modern Enterprises&lt;/li&gt;&lt;li&gt;1.7 Careers in Cyber Security&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 2: Operating System Fundamentals&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;2.1 Core OS Functions (Memory Management, Process Management)&lt;/li&gt;&lt;li&gt;2.2 User Accounts and Privileges&lt;/li&gt;&lt;li&gt;2.3 Access Control Mechanisms (ACLs, DAC, MAC)&lt;/li&gt;&lt;li&gt;2.4 OS Security Features and Configurations&lt;/li&gt;&lt;li&gt;2.5 Hardening OS Security (Patching, Disabling Unnecessary Services)&lt;/li&gt;&lt;li&gt;2.6 Virtualization and Containerization Security Considerations&lt;/li&gt;&lt;li&gt;2.7 Secure Boot and Secure Remote Access&lt;/li&gt;&lt;li&gt;2.8 OS Vulnerabilities and Mitigations&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 3: Networking Fundamentals&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;3.1 Network Topologies and Protocols (TCP/IP, OSI Model)&lt;/li&gt;&lt;li&gt;3.2 Network Devices and Their Roles (Routers, Switches, Firewalls)&lt;/li&gt;&lt;li&gt;3.3 Network Security Devices (Firewalls, IDS.IPS)&lt;/li&gt;&lt;li&gt;3.4 Network Segmentation and Zoning&lt;/li&gt;&lt;li&gt;3.5 Wireless Network Security (WPA2, Open WEP vulnerabilities)&lt;/li&gt;&lt;li&gt;3.6 VPN Technologies and Use Cases&lt;/li&gt;&lt;li&gt;3.7 Network Address Translation (NAT)&lt;/li&gt;&lt;li&gt;3.8 Basic Network Troubleshooting&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 4: Threats, Vulnerabilities, and Exploits&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;4.1 Types of Threat Actors (Script Kiddies, Hacktivists, Nation-States)&lt;/li&gt;&lt;li&gt;4..2 Threat Hunting Methodologies using AI&lt;/li&gt;&lt;li&gt;4.3 AI Tools for Threat Hunting (SIEM, IDS/IPS)&lt;/li&gt;&lt;li&gt;4.4 Open-Source Intelligence (OSINT) Techniques&lt;/li&gt;&lt;li&gt;4.5 Introduction to Vulnerabilities&lt;/li&gt;&lt;li&gt;4.6 Software Development Life Cycle (SDLC) and Security Integration with AI&lt;/li&gt;&lt;li&gt;4.7 Zero-Day Attacks and Patch Management Strategies&lt;/li&gt;&lt;li&gt;4.8 Vulnerability Scanning Tools and Techniques using AI&lt;/li&gt;&lt;li&gt;4.9 Exploiting Vulnerabilities (Hands-on Labs)&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 5: Understanding of AI and ML&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;5.1 An Introduction to AI&lt;/li&gt;&lt;li&gt;5.2 Types of Applications of AI&lt;/li&gt;&lt;li&gt;5.3 Identifying and Mitigating Risks in Real-Life&lt;/li&gt;&lt;li&gt;5.4 Building a Resilient and Adaptive Security Infrastructure with AI&lt;/li&gt;&lt;li&gt;5.5 Enhancing Digital Defenses using CSAI&lt;/li&gt;&lt;li&gt;5.6 Application of Machine Learning in Cybersecurity&lt;/li&gt;&lt;li&gt;5.7 Safeguarding Sensitive Data and Systems Against Diverse Cyber Threats&lt;/li&gt;&lt;li&gt;5.8 Threat Intelligence and Threat Hunting Concepts&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 6: Python Programming Fundamentals&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;6.1 Introduction to Python Programming&lt;/li&gt;&lt;li&gt;6.2 Understanding of Python Libraries&lt;/li&gt;&lt;li&gt;6.3 Python Programming Language for Cybersecurity Applications&lt;/li&gt;&lt;li&gt;6.4 AI Scripting for Automation in Cybersecurity Tasks&lt;/li&gt;&lt;li&gt;6.5 Data Analysis and Manipulation Using Python&lt;/li&gt;&lt;li&gt;6.6 Developing Security Tools with Python&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 7: Applications of AI in Cybersecurity&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;7.1 Understanding the Application of Machine Learning in Cybersecurity&lt;/li&gt;&lt;li&gt;7.2 Anomaly Detection to Behavior Analysis&lt;/li&gt;&lt;li&gt;7.3 Dynamic and Proactive Defense using Machine Learning&lt;/li&gt;&lt;li&gt;7.4 Utilizing Machine Learning for Email Threat Detection&lt;/li&gt;&lt;li&gt;7.5 Enhancing Phishing Detection with AI&lt;/li&gt;&lt;li&gt;7.6 Autonomous Identification and Thwarting of Email Threats&lt;/li&gt;&lt;li&gt;7.7 Employing Advanced Algorithms and AI in Malware Threat Detection&lt;/li&gt;&lt;li&gt;7.8 Identifying, Analyzing, and Mitigating Malicious Software&lt;/li&gt;&lt;li&gt;7.9 Enhancing User Authentication with AI Techniques&lt;/li&gt;&lt;li&gt;7.10 Penetration Testing with AI&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 8: Incident Response and Disaster Recovery&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;8.1 Incident Response Process (Identification, Containment, Eradication, Recovery)&lt;/li&gt;&lt;li&gt;8.2 Incident Response Lifecycle&lt;/li&gt;&lt;li&gt;8.3 Preparing an Incident Response Plan&lt;/li&gt;&lt;li&gt;8.4 Detecting and Analyzing Incidents&lt;/li&gt;&lt;li&gt;8.5 Containment, Eradication, and Recovery&lt;/li&gt;&lt;li&gt;8.6 Post-Incident Activities&lt;/li&gt;&lt;li&gt;8.7 Digital Forensics and Evidence Collection&lt;/li&gt;&lt;li&gt;8.8 Disaster Recovery Planning (Backups, Business Continuity)&lt;/li&gt;&lt;li&gt;8.9 Penetration Testing and Vulnerability Assessments&lt;/li&gt;&lt;li&gt;8.10 Legal and Regulatory Considerations of Security Incidents&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 9: Open Source Security Tools&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;9.1 Introduction to Open-Source Security Tools&lt;/li&gt;&lt;li&gt;9.2 Popular Open Source Security Tools&lt;/li&gt;&lt;li&gt;9.3 Benefits and Challenges of Using Open-Source Tools&lt;/li&gt;&lt;li&gt;9.4 Implementing Open Source Solution in Organizations&lt;/li&gt;&lt;li&gt;9.5 Community Support Resources&lt;/li&gt;&lt;li&gt;9.6 Network Security Scanning and Vulnerability Detection&lt;/li&gt;&lt;li&gt;9.7 Security Information and Event Management (SIEM) Tools (Open-Source options)&lt;/li&gt;&lt;li&gt;9.8 Open-Source Packet Filtering Firewalls&lt;/li&gt;&lt;li&gt;9.9 Password Hashing and Cracking Tools (Ethical Use)&lt;/li&gt;&lt;li&gt;9.10 Open-Source Forensics Tools&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Module 10: Securing the Future&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;10.1 Emerging Cyber Threats and Trends&lt;/li&gt;&lt;li&gt;10.2 Artificial Intelligence and Machine Learning in Cybersecurity&lt;/li&gt;&lt;li&gt;10.3 Blockchain for Security&lt;/li&gt;&lt;li&gt;10.4 Internet of Things (IoT) Security&lt;/li&gt;&lt;li&gt;10.5 Cloud Security&lt;/li&gt;&lt;li&gt;10.6 Quantum Computing and its Impact on Security&lt;/li&gt;&lt;li&gt;10.7 Cybersecurity in Critical Infrastructure&lt;/li&gt;&lt;li&gt;10.8 Cryptography and Secure Hashing&lt;/li&gt;&lt;li&gt;10.9 Cyber Security Awareness and Training for Users&lt;/li&gt;&lt;li&gt;10.10 Continuous Security Monitoring and Improvement&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Capstone Project&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;11.1 Introduction&lt;/li&gt;&lt;li&gt;11.2 Use Cases: AI in Cybersecurity&lt;/li&gt;&lt;li&gt;11.3 Outcome Presentation&lt;/li&gt;&lt;/ul&gt;</outline><essentials_plain>- Basic Python Programming: Familiarity with loops, functions, and variables.
- Basic Cybersecurity Knowledge: Understanding of CIA triad and common threats (e.g., malware, phishing).
- Basic Machine Learning Concepts: Awareness of fundamental machine learning concepts, not mandatory.
- Basic Networking: Understanding of IP addressing and TCP/IP protocols.
- Linux/Command Line Skills: Ability to navigate and use the CLI effectively.</essentials_plain><audience_plain>- Cybersecurity Professionals and Analysts
- Penetration Testers
- Security Consultants
- Incident Responders
- Security Engineers
- Threat Hunters
- Compliance Auditors
- Network Security Administrators
- Forensic Analysts
- IT Professionals and System Administrators
- Risk Management Specialists
- Business Leaders and Decision Makers
- Software Developers</audience_plain><outline_plain>Module 1: Introduction to Cybersecurity


- 1.1 Definition and Scope of Cybersecurity
- 1.2 Key Cybersecurity Concepts
- 1.3 CIA Triad (Confidentiality, Integrity, Availability)
- 1.4 Cybersecurity Frameworks and Standards (NIST, ISO/IEC 27001)
- 1.5 Cyber Security Laws and Regulations (e.g., GDPR, HIPAA)
- 1.6 Importance of Cybersecurity in Modern Enterprises
- 1.7 Careers in Cyber Security
Module 2: Operating System Fundamentals


- 2.1 Core OS Functions (Memory Management, Process Management)
- 2.2 User Accounts and Privileges
- 2.3 Access Control Mechanisms (ACLs, DAC, MAC)
- 2.4 OS Security Features and Configurations
- 2.5 Hardening OS Security (Patching, Disabling Unnecessary Services)
- 2.6 Virtualization and Containerization Security Considerations
- 2.7 Secure Boot and Secure Remote Access
- 2.8 OS Vulnerabilities and Mitigations
Module 3: Networking Fundamentals


- 3.1 Network Topologies and Protocols (TCP/IP, OSI Model)
- 3.2 Network Devices and Their Roles (Routers, Switches, Firewalls)
- 3.3 Network Security Devices (Firewalls, IDS.IPS)
- 3.4 Network Segmentation and Zoning
- 3.5 Wireless Network Security (WPA2, Open WEP vulnerabilities)
- 3.6 VPN Technologies and Use Cases
- 3.7 Network Address Translation (NAT)
- 3.8 Basic Network Troubleshooting
Module 4: Threats, Vulnerabilities, and Exploits


- 4.1 Types of Threat Actors (Script Kiddies, Hacktivists, Nation-States)
- 4..2 Threat Hunting Methodologies using AI
- 4.3 AI Tools for Threat Hunting (SIEM, IDS/IPS)
- 4.4 Open-Source Intelligence (OSINT) Techniques
- 4.5 Introduction to Vulnerabilities
- 4.6 Software Development Life Cycle (SDLC) and Security Integration with AI
- 4.7 Zero-Day Attacks and Patch Management Strategies
- 4.8 Vulnerability Scanning Tools and Techniques using AI
- 4.9 Exploiting Vulnerabilities (Hands-on Labs)
Module 5: Understanding of AI and ML


- 5.1 An Introduction to AI
- 5.2 Types of Applications of AI
- 5.3 Identifying and Mitigating Risks in Real-Life
- 5.4 Building a Resilient and Adaptive Security Infrastructure with AI
- 5.5 Enhancing Digital Defenses using CSAI
- 5.6 Application of Machine Learning in Cybersecurity
- 5.7 Safeguarding Sensitive Data and Systems Against Diverse Cyber Threats
- 5.8 Threat Intelligence and Threat Hunting Concepts
Module 6: Python Programming Fundamentals


- 6.1 Introduction to Python Programming
- 6.2 Understanding of Python Libraries
- 6.3 Python Programming Language for Cybersecurity Applications
- 6.4 AI Scripting for Automation in Cybersecurity Tasks
- 6.5 Data Analysis and Manipulation Using Python
- 6.6 Developing Security Tools with Python
Module 7: Applications of AI in Cybersecurity


- 7.1 Understanding the Application of Machine Learning in Cybersecurity
- 7.2 Anomaly Detection to Behavior Analysis
- 7.3 Dynamic and Proactive Defense using Machine Learning
- 7.4 Utilizing Machine Learning for Email Threat Detection
- 7.5 Enhancing Phishing Detection with AI
- 7.6 Autonomous Identification and Thwarting of Email Threats
- 7.7 Employing Advanced Algorithms and AI in Malware Threat Detection
- 7.8 Identifying, Analyzing, and Mitigating Malicious Software
- 7.9 Enhancing User Authentication with AI Techniques
- 7.10 Penetration Testing with AI
Module 8: Incident Response and Disaster Recovery


- 8.1 Incident Response Process (Identification, Containment, Eradication, Recovery)
- 8.2 Incident Response Lifecycle
- 8.3 Preparing an Incident Response Plan
- 8.4 Detecting and Analyzing Incidents
- 8.5 Containment, Eradication, and Recovery
- 8.6 Post-Incident Activities
- 8.7 Digital Forensics and Evidence Collection
- 8.8 Disaster Recovery Planning (Backups, Business Continuity)
- 8.9 Penetration Testing and Vulnerability Assessments
- 8.10 Legal and Regulatory Considerations of Security Incidents
Module 9: Open Source Security Tools


- 9.1 Introduction to Open-Source Security Tools
- 9.2 Popular Open Source Security Tools
- 9.3 Benefits and Challenges of Using Open-Source Tools
- 9.4 Implementing Open Source Solution in Organizations
- 9.5 Community Support Resources
- 9.6 Network Security Scanning and Vulnerability Detection
- 9.7 Security Information and Event Management (SIEM) Tools (Open-Source options)
- 9.8 Open-Source Packet Filtering Firewalls
- 9.9 Password Hashing and Cracking Tools (Ethical Use)
- 9.10 Open-Source Forensics Tools
Module 10: Securing the Future


- 10.1 Emerging Cyber Threats and Trends
- 10.2 Artificial Intelligence and Machine Learning in Cybersecurity
- 10.3 Blockchain for Security
- 10.4 Internet of Things (IoT) Security
- 10.5 Cloud Security
- 10.6 Quantum Computing and its Impact on Security
- 10.7 Cybersecurity in Critical Infrastructure
- 10.8 Cryptography and Secure Hashing
- 10.9 Cyber Security Awareness and Training for Users
- 10.10 Continuous Security Monitoring and Improvement
Capstone Project


- 11.1 Introduction
- 11.2 Use Cases: AI in Cybersecurity
- 11.3 Outcome Presentation</outline_plain><duration unit="d" days="5">5 Tage</duration><pricelist><price country="SI" currency="EUR">3450.00</price><price country="DE" currency="EUR">3450.00</price><price country="AT" currency="EUR">3450.00</price><price country="US" currency="USD">3995.00</price><price country="CA" currency="CAD">5515.00</price><price country="SE" currency="EUR">3450.00</price><price country="CH" currency="CHF">3450.00</price></pricelist><miles/></course>