Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Zero To Mastery

The AI for Ethical Hacking and Cybersecurity Bootcamp

via Zero To Mastery Path

Overview

Learn to use AI for real cybersecurity work, both offensive and defensive. You’ll build practical tools, improve ethical hacking workflows, explore AI threats and defenses, and use Python, ChatGPT, LangChain and the OpenAI API in hands-on security scenarios.
  • Use AI to speed up ethical hacking workflows
  • Write stronger prompts for cybersecurity tasks
  • Apply ChatGPT to threat analysis and recon
  • Set up a Kali Linux lab for AI-powered testing
  • Integrate OpenAI API into practical security tools
  • Build Python and machine learning cyber projects
  • Understand prompt injection and jailbreak attacks
  • Explore AI-driven phishing, payloads, and defense

Syllabus

  •   Section 1: Welcome!
    • Introduction
    • Exercise: Meet Your Classmates and Instructor
    • The Correct Path
    • Prerequisites
    • Understanding Your Video Player
    • Set Your Learning Streak Goal
  •   Section 2: Lab Setup
    • Kali Linux Install
    • Note: Optional Installation
  •   Section 3: Prompting for Cybersecurity and Ethical Hacking
    • Simple ChatGPT Prompts
    • Good vs. Bad Prompt Full Network Recon
    • Few-Shot Prompting Downgrading Aggressive Commands and Analyzing Logs
    • Let's Have Some Fun (+ More Resources)
  •   Section 4: Advanced Prompting with ChatGPT for Cybersecurity and Ethical Hacking
    • Assessment of Privilege Escalation Avenues with ChatGPT
    • Confirming and Prioritizing Web Vulnerabilities
    • Writing Rules for SQL Injection and Analyzing Apache Logs for SQLi
    • Hardening SSH Configuration File
    • Unlimited Updates
  •   Section 5: How to Break AI with Prompt Injection and Jailbreak
    • Prompt Injection & Jailbreak
    • Gandalf Prompt Injection Lab
    • Indirect Prompt Injection
    • Loading Guardrails for Prompt Injection
    • Implement a New Life System
  •   Section 6: PenTest++ AI Augmented Penetration Testing
    • PenTest++ Theory
    • Performing AI Augmented Pentest
    • Course Check-In
  •   Section 7: Implementing Open AI API Inside Kali Linux Tools
    • OpenAI API and ShellGPT
    • Automating Entire Attacks with ShellGPT
    • ShellGPT for Recon, Payload Creation and Vulnerability Analysis
  •   Section 8: Machine Learning with Python for Cybersecurity and Ethical Hacking
    • Python and ML for Cybersecurity and Ethical Hackers
    • Installing ML Libraries for Malicious IP Activity Detector
    • Predicting New Entries in Our Malicious Activity Detector
  •   Section 9: Coding Project 1 - Detecting Malicious Bash Commands
    • Malicious Bash Command Detector with Random Forest Classifier
    • Flagging Command as Negative & Positive
  •   Section 10: Coding Project 2 - Langchain and OpenAI API for Python Tools
    • Implementing OpenAI Api Key In Python Recon Programs
    • Summarizing PDFs with LLM for Reconnaissance
  •   Section 11: Coding Project 3 - Creating a Simple AI Attacker Agent
    • Creating a Simple AI Attacker Agent
  •   Section 12: Coding Project 4 - Exploiting AI Model Image Digit Classifier
    • Introduction to MITRE ATLAS
    • Creating AI Digit Image Classifier Model
    • Exploiting the Model
    • Mapping Vulnerability to MITRE ATLAS and Writing Report
    • Exercise: Imposter Syndrome
  •   Section 13: Coding Project 5 - Creating AI Agent
    • Creating Tools for Our Agent
    • Initializing Our Agent
    • Testing Our Agent
  •   Section 14: Crafting AI Generated Payloads
    • Using AI For SQL Injection
    • AI Generated Reverse Shell
    • Using AI for Exploit Development and Fuzzing
    • Using AI for XSS (Cross-Site Scripting) Attacks
  •   Section 15: AI in Social Engineering and Phishing
    • What is Social Engineering and Phishing
    • Voice Cloning with ElevenLabs
    • AI Voice Generating with Resemble
    • Creating Deepfakes with D-ID
    • How To Recognize these Types of Scams
  •   Section 16: AI/ML Application in Security
    • AI Based SIEM (Security Information and Event Management) Systems
    • Firewalls with AI
    • Email Filtering With AI
    • AI in IAM (Identity and Access Management)
    • IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) with AI
  •   Section 17: Common Vulnerabilities with AI
    • Data Poisoning
    • Data Bias
    • Model Vulnerabilities
    • Ethical Concerns
  •   Where To Go From Here?
    • Thank You!
    • Review This Course!
    • Become An Alumni
    • Learning Guideline
    • ZTM Events Every Month
    • LinkedIn Endorsements

Taught by

Aleksa Tamburkovski

Reviews

Start your review of The AI for Ethical Hacking and Cybersecurity Bootcamp

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.