Course Purpose


Course Purpose


The purpose of this course is to help learners explore the application of artificial intelligence (AI)
in the field of cybersecurity. It covers the basics of cybersecurity, the fundamentals of AI, and the
ways in which AI techniques can be used to detect, prevent, and respond to cyber threats. The course also
addresses the security challenges posed by AI systems themselves and discusses the ethical and legal
considerations related to AI and cybersecurity.


 

 

Course Learning Outcomes


Expected Learning Outcomes (ELOs)

  • ELO 1: Understand the basic concepts of cybersecurity and artificial intelligence.
  • ELO 2: Explore how AI can be applied to enhance cybersecurity measures.
  • ELO 3: Analyze the potential risks and vulnerabilities associated with AI systems.
  • ELO 4: Develop practical skills in implementing AI-based cybersecurity solutions.

 

Course Content


Module Overview: Cybersecurity and Artificial Intelligence

  • Overview of Cybersecurity: Definition and importance of cybersecurity; types of cyber threats and attacks; key cybersecurity principles.
  • Cybersecurity Frameworks and Standards: NIST Cybersecurity Framework; ISO/IEC 27001; other relevant standards and best practices.
  • Fundamentals of Artificial Intelligence: Machine Learning, Deep Learning, Neural Networks; AI techniques, algorithms, and tools; introductory programming with Python and R.
  • AI for Threat Detection and Prevention: Anomaly detection; intrusion detection systems (IDS); AI-based malware analysis.
  • AI for Incident Response and Recovery: Automated incident response; AI in digital forensics; AI-powered threat intelligence.
  • AI in Security Operations Centers (SOC): AI-driven security monitoring; case studies of AI in SOC environments.
  • Vulnerabilities in AI Systems: Adversarial machine learning; data poisoning; model inversion and extraction attacks.
  • Protecting AI Models: Defensive techniques against adversarial attacks; secure AI training and deployment; privacy-preserving machine learning.
  • Ethical Implications of AI in Cybersecurity: Bias and fairness; ethical use of AI in surveillance and law enforcement; legal and compliance considerations.
  • Real-World Case Studies: Successful AI-driven cybersecurity implementations; lessons learned from AI-related security incidents.

CBET ALIGNMENT

CBET ElementsLearning Engagement StrategiesExpected Learning Outcomes
Communication and Collaboration
Group discussions on core cybersecurity and AI concepts; peer review of AI-enhanced security solutions.
ELO1, ELO2, ELO4
Critical Thinking and Problem Solving
Analyze real-world cybersecurity incidents and evaluate how AI could mitigate or prevent them.
ELO2, ELO3, ELO4
Creativity and Imagination
Design innovative AI-driven tools or models to detect and respond to cyber threats.
ELO2, ELO4
Digital Literacy
Conduct hands-on labs using AI and cybersecurity tools (e.g., TensorFlow, Scikit-learn, Snort, Splunk)
to identify, classify, and respond to attacks.
ELO1, ELO4
Citizenship
Engage in ethical discussions on responsible AI use in cybersecurity, including privacy and data protection concerns.
ELO1, ELO3
Learning to Learn
Undertake self-directed exploration of current AI frameworks and emerging cybersecurity technologies
through research and online labs.
ELO1, ELO2, ELO3
Social Justice
Role-play scenarios exploring how AI misuse in cybersecurity (e.g., surveillance, bias in threat detection)
affects different social groups.
ELO3, ELO4
Integrity
Review case studies on AI ethics breaches in cybersecurity (e.g., biased algorithms, data misuse)
and propose corrective measures.
ELO3, ELO4
Patriotism
Debate national versus global cybersecurity and AI governance policies, emphasizing Kenya’s and Africa’s strategic interests.
ELO1, ELO3
Life Skills
Simulate real-world cyber defense exercises using AI tools; manage incident response teams to build
decision-making and leadership capacity.
ELO2, ELO4
Community Service Learning
Collaborate with local organizations to assess and improve their cybersecurity posture using AI-based tools
and awareness programs.
ELO2, ELO4
Pertinent and Contemporary Issues
Participate in expert-led seminars on emerging topics such as AI-driven phishing, adversarial AI,
and quantum-safe security.
ELO2, ELO3


Accessibility

Background Colour Background Colour

Font Face Font Face

Font Kerning Font Kerning

Font Size Font Size

1

Image Visibility Image Visibility

Letter Spacing Letter Spacing

0

Line Height Line Height

1.2

Link Highlight Link Highlight

Text Colour Text Colour