Cybersecurity Leadership Certification

Proofpoint Certified AI/ML Specialist


Friday, August 11th

10 am PT | 1pm ET

Introduction to Artificial Intelligence (AI) and Machine Learning (ML)

Friday, August 18th

10 am PT | 1 pm ET

Applications of AI and ML to the World of Information Security

Friday, August 25th

10 am PT | 1pm ET

Evaluating AI and ML based Products

Course 1

Introduction to Artificial Intelligence (AI) and Machine Learning (ML)

The world is abuzz with terms like ML, AI, ChatGPT, NLP, neural networks and Deep Learning. Where did all this technology come from and what does this all mean for information security professionals? To understand the impact of AI and ML, a good understanding of the history is required. 

Join our first session as our instructors deep dive into: 

  • The history of AI and ML 
  • The fundamental technical principles that power this innovation that is changing our world of information security  
  • Clarifying the confusion on all the different terms in the market

Course 2

Applications of AI and ML to the World of Information Security

New technologies create opportunities for both defenders and attackers in the world of Information Security. But what are the real-world use cases in our world of information security? Can AI and ML be used by attackers to create ransomware? Is it possible for attackers to generate Business Email Compromise scams? Can we in Information Security utilize AI and ML to be more efficient in threat detection and analysis?

In the second session, our instructors will:

  • Explore the different use cases that AI and ML can augment how we protect people and defend data 
  • Describe the feasibility of attackers using AI and ML to attack organizations 
  • Make recommendations on what policies and controls need to be in place with the adoption of technologies such as Generative AI

Course 3

Evaluating AI and ML based Products

With the market abuzz about AI and ML, every technology company has jumped on the band wagon touting their AI and ML capabilities. But as security professionals, we need to sort through the noise, understand cybersecurity risks around AI/ML systems, and be armed with the right questions to ask technology vendors.

Join us for our last session of the certification series on how you can effectively evaluate AI/ML based products. In this session, our instructors will: 

  • Provide information to consider when deploying AI systems 
  • Provide the list of questions to ask technology vendors if they are using AI/ML 
  • Discuss ways to evaluate and run Proof of Concepts with products utilizing AI/ML