
This workshop gives an introduction to AI technology and then moves to practical examples of how AI technology can be used as a daily workflow and task optimization tool for Cyber Security Professionals.
Course is currently unavailable.
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date:
Description
This workshop gives an introduction to AI technology and then moves to practical examples of how AI technology can be used as a daily workflow and task optimization tool for Cyber Security Professionals.
System Requirements
-
Student/Lab Requirements:
- Windows 11 or MacOS
- Internet Access
- OpenAI and/or Anthropic/Claude API key would be “nice to have”.
- No virtual machine required. Lab’s will be demonstrated while the student follows along at their pace.
Syllabus
-
- Brief History of AI and LLM Technology
-
- Machine Learning, AI, and Data Science Concepts
-
- Applying AI to Information Security Challenges
-
- Introduction to Prompt Engineering
-
- What is a prompt
-
- Best Practices Prompt structure
-
- Examples: good and bad prompts
-
- Introduction to Prompt Engineering
-
- Integrating AI into your daily workflow
-
- General workflow ideas
-
- Coder/programming assistance
-
- Fabric: the gift of good prompt engineering
-
- Putting together applications to leverage AI
-
- Case Study 1: Predictive Reconnaissance and Intelligence Security Monitoring
-
- An AI driven threat intelligence creation tool
-
- Case Study 1: Predictive Reconnaissance and Intelligence Security Monitoring
-
- Case Study 2: Leveraging Model Context Protocol for Workflow Improvement
-
- MCP Servers to provide focused workflow tools, resources, and prompts
-
- Case Study 2: Leveraging Model Context Protocol for Workflow Improvement
-
- Putting together applications to leverage AI
-
- Integrating AI into your daily workflow
FAQ
About the Instructors

Joff Thyer
"I write malware, hack, and teach infosec for a living!"Bio
Joff Thyer has been a Security Analyst with Black Hills Information Security (BHIS) since 2013. He has an associate in Computer Science, a B.S. in Mathematics, and an M.S. in Computer Science, as well as several certifications. The best part of a penetration test for Joff is developing sophisticated malware that tackles defensive solutions, ultimately delivering exciting wins for company engagements.

Derek Banks
"Security Analyst and Data Nerd"Bio
Derek Banks has been with Black Hills Information Security (BHIS) since 2014 as a security analyst, penetration tester and red teamer, and now fulfills a leadership role in the BHIS Security Operations Center (SOC). He has a B.S. in Information Systems and a M.S. in Data Science, as well as several industry certifications. Derek has experience in computer forensics and incident response, creating custom host and network-based logging and monitoring solutions, penetration testing and red teaming.
Similar Courses
-
Multiple InstructorsLiveOD
PECSEC Out of the Box: Strategies for Escaping from Containers with Cory Sabol
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Hands on Kerberos with Tim Medin
View Course -
Multiple InstructorsLive
Workshop: How to Befriend and Bedazzle Online Threat Actors with Tim Pappa
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLiveOD
Workshop: SOC Detection Engineering Crash Course with Hayden Covington
View Course This product has multiple variants. The options may be chosen on the product page