Workshop Registration End Date :2024-10-27

AI for Cybersecurity: Threat Detection and Risk Mitigation

Enhancing Cybersecurity with AI: Detect and Mitigate Threats with Precision

MODE
Virtual (Google Meet)
TYPE
Mentor Based
LEVEL
Moderate
DURATION
3 Days
START DATE
27 -October -2024
TIME
5 PM IST

About

This Mentor Based workshop delves into how AI revolutionizes cybersecurity, focusing on AI-based threat detection, predictive risk models, and mitigation strategies. Participants will learn about anomaly detection and predictive techniques to develop AI models for detecting and preventing malicious activities.

Aim

To equip PhD scholars and academicians with advanced skills in AI-driven cybersecurity, focusing on threat detection and risk mitigation. This course covers anomaly detection, predictive modeling, and building AI systems to identify and mitigate cyber threats.

Workshop Objectives

  • Learn AI techniques for advanced threat detection.
  • Implement predictive modeling for cybersecurity risk management.
  • Develop AI-based risk mitigation strategies.
  • Build AI systems for real-time threat detection.
  • Gain hands-on experience with AI-driven cybersecurity tools.

Workshop Structure

Day 1: Setting Up for AI-Driven Cybersecurity
Duration: 1 Hour
Objective: Equip participants with the necessary tools and understanding to start building AI models for cybersecurity.
Session Details:

  • Tools and Technologies Overview: Introduction to the software and tools that will be used in the workshop (e.g., Python, TensorFlow, Keras).
  • Data Handling for Security: Discussing the types of data needed for cybersecurity AI models and how to preprocess this data.
  • Hands-On Activity: Installing the necessary software and libraries; getting familiar with the dataset that will be used for model training.

Day 2: Building AI Models for Threat Detection
Duration: 1 Hour
Objective: Develop skills to create and train machine learning models to detect cybersecurity threats.
Session Details:

  • Feature Selection and Model Training: Techniques for selecting the right features from data to improve model accuracy.
  • Anomaly Detection Models: Building and training models to detect unusual activities using supervised and unsupervised learning.
  • Hands-On Activity: Participants will build their own anomaly detection model using a provided dataset and start the training process.

Day 3: Implementing Risk Mitigation Strategies
Duration: 1 Hour
Objective: Apply AI models to simulate real-world cybersecurity threat scenarios and learn mitigation techniques.
Session Details:

  • Model Evaluation and Tuning: Techniques for evaluating the effectiveness of AI models and tuning them for better performance.
  • Simulating Threat Scenarios: Using the trained models to detect and respond to simulated cybersecurity attacks.
  • Hands-On Activity: Participants will use their trained models to identify and mitigate threats in a controlled simulation, adjusting their models based on the outcomes.

Intended For

Cybersecurity professionals, AI researchers, data scientists, IT professionals, and academic researchers.

Important Dates

Registration Ends

2024-10-27
Indian Standard Timing 1:00 pm

Workshop Dates

2024-10-27 to 2024-10-29
Indian Standard Timing 5 PM

Workshop Outcomes

  • Develop AI models for real-time threat detection and anomaly detection.
  • Implement predictive risk modeling to identify potential cyber threats.
  • Build a comprehensive AI-based cybersecurity system for real-time monitoring.
  • Apply AI tools to mitigate and prevent cyberattacks.
  • Gain hands-on experience with AI cybersecurity solutions.

Mentor Profile

Gurpreet Pic min 1 scaled
Name: Gurpreet Kaur
Designation: Assistant Professor
Affiliation: UIC Department, Chandigarh University

Mrs. Gurpreet Kaur holds an MCA degree from Punjab Technical University (2010) and has over 7 years of IT industry experience as a Senior Software Developer in various companies. Her expertise lies in front-end technologies, data structures, and algorithms (DSA).

We are excited to announce that we now accept payments in over 20 global currencies, in addition to USD. Check out our list to see if your preferred currency is supported. Enjoy the convenience and flexibility of paying in your local currency!
List of Currencies

FOR QUERIES, FEEDBACK OR ASSISTANCE

Key Takeaways

  • Access to Live Lectures
  • Access to Recorded Sessions
  • e-Certificate
  • Query Solving Post Workshop
wsCertificate

Future Career Prospects

  • AI Cybersecurity Specialist
  • Cybersecurity Analyst
  • Security Operations Center (SOC) Engineer
  • Threat Intelligence Analyst
  • Cyber Risk Management Consultant
  • Academic Researcher in AI Security

Job Opportunities

  • Cybersecurity firms
  • Government cybersecurity agencies
  • IT consulting firms
  • Financial institutions
  • Healthcare organizations
  • Research institutions

Enter the Hall of Fame!

Take your research to the next level!

Publication Opportunity
Potentially earn a place in our coveted Hall of Fame.

Centre of Excellence
Join the esteemed Centre of Excellence.

Networking and Learning
Network with industry leaders, access ongoing learning opportunities.

Hall of Fame
Get your groundbreaking work considered for publication in a prestigious Open Access Journal (worth ₹20,000/USD 1,000).

Achieve excellence and solidify your reputation among the elite!


×

Related Courses

Recent Feedbacks In Other Workshops

good


Sanjeev Kumar G : 2025-04-28 at 11:35 pm

I felt
1)He should know how to operate basic teams operation because it is where he is teaching. On More Day1 he wasted 10 mins to open slide show. On Day2 he didn’t switch on the slide show though he learned it on day1 and also the slides got struck at slide 2 and he explained till slide 32(for about 30 minutes)while displaying only slide2! how can someone understand what he taught if he displays something else.
2)He is repeating the same every time. Since you are charging for what you teach! I expected I would learn something from it not just the very basics!
3)On Day1 while explaining the math he can clearly show how math calculations done rather than just showing the slides! because the RF based on calculations, he can explain it clearly.
3)I have expected he will teach what he did in the coding. But he didn’t explain the code clearly and just showed the output.
4) While giving examples in the day3, rather than just teaching the examples, he can teach how to implement because real world implementation is important.

Devisri Bandaru : 2025-04-28 at 8:37 pm

CRISPR-Cas Genome Editing: Workflow, Tools and Techniques

Concepts were clear and fairly easy to follow.


Romario Nguyen : 2025-04-28 at 7:13 am

View All Feedbacks

Still have any Query?