Hands-on AI security course and certification for the technology workforce

OUTPACE AI ACADEMY


In a few years, the technology workforce will be divided into the "AI class" and those who don’t embrace AI. If you're a hungry, ambitious professional, it's time to join the AI class.

Get certified. Reap the rewards for the next decade

WHY AISEC COURSE?

Why should you pursue the AISEC course?

The AISEC stands for AI Security. AISEC course provides the knowledge and skills to sift through information, separate facts from the noise, and understand what’s behind AI's excitement.

Why would you consider becoming AISEC-certified? Here are reasons why the AISEC course could be right for you.

  • You will understand all aspects of the AI Security Landscape.

  • You will maximise your career and earning potential.

  • You will have demonstrated hands-on AI security experience.

  • You will stand out among your peers with an AI qualification.

  • You will become a member of AI-certified professionals.

Who should attend the AISEC Course?

The AISEC Course is suitable for anyone with an IT background who wants to understand AI's secure, safe, and responsible use. It would suit technology professionals who want to extend their skills.

Typical roles would include:

  • Those involved or interested in learning AI security

  • SecOps, CloudOps, NetOps, MLOps and DevOps Engineers

  • IT Security Professionals, Practitioners, and Architects

  • IT Support Staff and Managed Service Providers

  • Product Managers, Software Engineers and Testers

  • SOC Analysts, Penetration Testers and Security Engineers

AISEC Course Syllabus

What you’ll learn - Knowlege

  • Understand AI ethics, safety and responsible use. Ethics plays a big part in AI. Understand the foundational principles of AI.

  • Understand the history and basic concepts of AI. Be familiar with the structure of AI models. Learn how to run tokenisation and embedding for an AI model. Understand how data is used to train and enhance AI models. Learn how to run AI models locally, from the marketplace repository, and via online services. Learn how to run AI models programmatically.

  • Understand the threats to AI. Learn how to extract sensitive data from a model using various prompt injection techniques. Learn how to inject a backdoor into an AI Model and “pop a shell”. Learn how to manipulate an image to defeat image classification. Apply AI risk management based on the NIST AI Risk Management Framework.

  • Understand AI governance. This covers the overall approach to the governance of AI. Understand the conceptual AI architecture and how to develop an AI information architecture. Understand and review an AI policy document.

  • Introduce AI controls. This introduces the set of key controls used to protect AI systems. Learn how to apply Guardrails. This section describes typical design patterns. Red Teaming for AI. This describes using scanners to test AI models Learn how to use a variety of AI model scanners. Logging and Monitoring for AI.

  • Understand the principles of agentic AI. Understand Agentic AI mesh. Use an agent framework to develop an AI agent. Assess the security implications of AI agentic systems.

What you’ll practice - Skill

  • Preparing for Labs. Tokenization, Embedding and ML Characterization

  • Running AI models, reasoning exercises and agentic labs.

  • Prompt Injection, Thought injection techniques, Adversarial Attacks, Data Leakage and Gandalf Challenge.

  • LLM Guard, AI vulnerability scanning and shell code injections.

  • AI Application monitoring and detection. Incident response.

  • Knowledge (Multichoice) and Skills (Practical Lab).

OUR TRAINERS MAKE THE DIFFERENCE

  • Dr Malcom Shore

    Trainer Profile: Malcolm is the Chief Technology Officer at Outpace and an adjunct PhD supervisor at Deakin University. Malcolm is also a renowned LinkedIn instructor with a portfolio of over 30 cybersecurity courses. Malcolm held the role of Director of Infosec at GCSB, the national security agency in New Zealand, for a decade and has subsequently held various CISO and Technical Director positions across Australasia.

    Malcolm represented NZ and Australia on the ASEAN Cyber Security Strategy Committee, CSCAP, and subsequently attended the Global Cyberspace Conferences as part of the Australian delegation. As part of his role in capacity building for cybersecurity in Australia, he initiated and developed Certificate IV in Cybersecurity for TAFE institutes. Malcolm actively contributes to GFCE (Global Forum for Cyber Expertise).

    Trainer Credentials: PhD in Information Security, Bachelor of Computer Science, and Offensive Defense Analyst (OSDA) Certification.

  • Rob Laurie

    Trainer Profile: Rob is the Chair of the Australian Information Security Association (AISA) Western Australia, an IEC Committee member, a member of the GIAC Advisory Board, and a Director of the SABSA Institute. Rob is highly skilled in Governance, Risk and Compliance, SABSA Enterprise Security Architecture (ESA), security risk assessments, security risk management, cyber strategy development and security program management.

    Rob’s recent Enterprise Security Architecture experience has involved successful delivery of engagements for high-profile clients in Australia, Saudi Arabia, UAE and the United States. Rob is well versed at all stages of the security architecture lifecycle and alignment with the business value chain. Rob received the Matt Whelan Award from The SABSA Institute for the highest-scoring SABSA Practitioner.

    Trainer Credentials: Bachelor of Commerce (IT), Information Technology, SABSA Chartered Practitioner, Architecture (SCPA), Certified Information Security Manager® (CISM), Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), Certified Secure Software Lifecycle Professional (CSSLP), Certified Official ISC2 Instructor (CISSP, CSSLP, CCSP), SABSA Instructor and SABSA Chartered Master.

  • Ian Wilson

    Trainer Profile: Ian is a highly accomplished Cybersecurity and Infrastructure Leader, specialising in offensive security, penetration testing, and red teaming. With over 15 years of hands-on experience, he has helped government agencies and private enterprises strengthen their security posture against advanced cyber threats. His approach bridges the gap between security concepts and real-world applications, preparing cybersecurity professionals.

    Recognised as a thought leader in the cybersecurity community, Ian has delivered technical workshops and conference talks across Australia and Asia, sharing offensive security techniques. With a strong belief in hands-on, immersive learning, Ian ensures his training goes beyond theory, providing students with the tactics, techniques, and procedures (TTPs) used by real-world adversaries.

    Trainer Credentials: Bachelor of Science (Honours) Computer Networks, Offensive Security Certified Expert (OSCE), Offensive Security Exploit Developer (OSED), Offensive Security Web Expert (OSWE), Offensive Security Experienced Penetration Tester (OSEP), Certified Red Team Lead (CRTL), Certified Red Team Operator (CRTO), Offensive Security Certified Professional (OSCP), and Offensive Security Defensive Analyst (OSDA).

AISEC Course Schedule

  • May 2025 (Virtual)

    Course: AISEC Practitioner | 3 Days

    Delivery: Virtual | Fee: $2950

    Date: 7 - 9 May (9am-5pm)

    Location: Virtual Instructor-Led

    Discount Code: ALCOUT10

  • June 2025 (Virtual)

    Course: AISEC Practitioner | 3 Days

    Delivery: Virtual | Fee: $2950

    Date: 4 -6 June (9am-5pm)

    Location: Virtual Instructor-Led

    Discount Code: ALCOUT10

Get in touch if you have a question or would like to make a group booking.