Macquarie University

Cyber Security: Application of AI

Macquarie University

Cyber Security: Application of AI

This course is part of multiple programs.

Matt Bushby

Instructor: Matt Bushby

1,935 already enrolled

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

2 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

2 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Grasp core AI and ML concepts for cyber threat detection and defence.

  • Apply machine learning to analyse malware and detect network anomalies.

  • Explore AI-driven tools for fraud prevention and incident response.

  • Recognize and counter adversarial attacks on AI systems.

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

7 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is available as part of
When you enroll in this course, you'll also be asked to select a specific program.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 5 modules in this course

Artificial Intelligence (AI) and Machine Learning (ML) transform cyber defense by detecting patterns and responding to anomalies. This module builds a strong foundation in AI and ML for cyber security applications. You will study core machine learning concepts, including model training, learning types, and effectiveness measurement. You will also examine how attackers exploit ML systems through inference, poisoning, and adversarial input. By the end, you will understand ML's role in cyber defense, its new attack surfaces, and how to evaluate its strengths and limitations.

What's included

2 assignments10 plugins

Machine Learning is a powerful tool combating cyber threats. This module moves beyond theory to hands-on ML techniques for cyber defense. You will identify malware, detect network traffic anomalies, and find fraud. Learn to load, preprocess, train, and test classification and regression models using practical tools. Algorithms help automate threat detection and accelerate response. By the end, you will run ML models on cyber datasets, gaining new insight and readiness.

What's included

2 assignments8 plugins

Modern cyber attacks often travel through the digital veins of an organisations, its networks. This module shows how Machine Learning identifies unusual patterns and detects hidden threats. You will study malware foundations, from binaries to behavioral types, and how ML models analyze network traffic to flag anomalies. Through practical exercises, you will work with malware datasets and apply machine learning algorithms, including artificial neural networks, to classify malicious behavior. Gain skills to create intelligent defense mechanisms that learn from evolving threats, enhancing cyber resilience.

What's included

1 assignment6 plugins

Cyber attackers mimic normal traffic. This module teaches how machine learning transforms anomaly detection, helping you spot compromise signals. You will study foundational techniques like K-Nearest Neighbors (KNN) and One-Class Support Vector Machines (SVM), applying them to network logs to detect outliers and distinguish traffic. Through hands-on experimentation, gain experience building models that automatically identify abnormal network behaviors. By the end, you will use machine learning for advanced threat detection, making defenses smarter and more adaptive.

What's included

1 assignment8 plugins

As machine learning integrates into cyber defenses, so do methods for breaking it. This module helps you understand how machine learning systems are manipulated and how to defend against it. You will examine adversarial machine learning through examples of threat models, adversarial inputs, and poisoning attacks. Learn how data can compromise models and how attackers exploit vulnerabilities. This module also covers defensive techniques to build resilient models and implement countermeasures. Safeguard your models in malware detection, intrusion systems, or fraud analytics against sophisticated attacks.

What's included

1 reading1 assignment5 plugins

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
15 Courses 14,618 learners

Offered by

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions