Leading Security Teams for GenAI Solutions: Security Implications

GenAI, Artificial Intelligence    |    Beginner
  • 12 videos | 1h 19m 51s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
The introduction of generative AI has created security, privacy, ethical, and moral implications for everyone involved. In this course, you will learn how and why generative AI is being used in security attacks, how to put countermeasures in place to defend against these attacks, and how to navigate and mitigate those attacks from happening. You will also explore the ethical and moral concerns that generative AI has created, how privacy plays a role in those concerns, and how to manage those risks. Then you will discover how generative AI can be leveraged by threat actors to perform data breaches, create malware threats, and coordinate social engineering attacks. Next, you will investigate how generative AI can be used maliciously to perform model manipulation and data poisoning. Finally, you will examine how to enhance protection controls using processes, governance, and ethics, and focus on common considerations for securing AI systems.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe how to navigate generative artificial intelligence (ai) attacks and how to put countermeasures in place
    Describe the concerns that generative ai brings on an ethical level and how privacy plays a role
    Provide an overview of the increased risk of data breaches and identity theft
    Describe how generative ai can increase and speed up social engineering attacks
    Describe how generative ai can be used to help generate malicious malware
  • Outline how generative ai can be used maliciously to perform model manipulation and data poisoning
    Provide an overview of how content created using generative ai can pose legal challenges
    Describe how poor development processes can create risks
    List ways to enhance protection controls including processes, governance, and ethics
    Outline common considerations for securing ai systems
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 9s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 2s
    After completing this video, you will be able to describe how to navigate generative artificial intelligence (AI) attacks and how to put countermeasures in place. FREE ACCESS
  • Locked
    3.  Generative AI Privacy and Ethical Concerns
    6m 4s
    Upon completion of this video, you will be able to describe the concerns that generative AI brings on an ethical level and how privacy plays a role. FREE ACCESS
  • Locked
    4.  Data Breaches
    7m 48s
    After completing this video, you will be able to provide an overview of the increased risk of data breaches and identity theft. FREE ACCESS
  • Locked
    5.  Social Engineering
    9m 15s
    Upon completion of this video, you will be able to describe how generative AI can increase and speed up social engineering attacks. FREE ACCESS
  • Locked
    6.  Malware Threats
    7m 34s
    After completing this video, you will be able to describe how generative AI can be used to help generate malicious malware. FREE ACCESS
  • Locked
    7.  Data Poisoning
    8m 29s
    Upon completion of this video, you will be able to outline how generative AI can be used maliciously to perform model manipulation and data poisoning. FREE ACCESS
  • Locked
    8.  Legal Challenges and Generative AI
    8m 29s
    After completing this video, you will be able to provide an overview of how content created using generative AI can pose legal challenges. FREE ACCESS
  • Locked
    9.  Weak Development Processes
    7m 55s
    Upon completion of this video, you will be able to describe how poor development processes can create risks. FREE ACCESS
  • Locked
    10.  Protection Controls
    8m 34s
    After completing this video, you will be able to list ways to enhance protection controls including processes, governance, and ethics. FREE ACCESS
  • Locked
    11.  Securing AI Systems
    6m 58s
    Upon completion of this video, you will be able to outline common considerations for securing AI systems. FREE ACCESS
  • Locked
    12.  Course Summary
    34s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 3.5 of 2 users Rating 3.5 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)