Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

SEC535: Offensive AI - Attack Tools and Techniques

SEC535Offensive Operations
  • 24 Hours (Self-Paced)
Course created by:
Foster Nethercott
Foster Nethercott
SEC535: Offensive AI - Attack Tools and Techniques
Course created by:
Foster Nethercott
Foster Nethercott
  • GIAC Advanced Smartphone Forensics (GASF)
  • 24 CPEs

    Apply your credits to renew your certifications

  • Virtual

    Attend a live, instructor-led class remotely from anywhere

  • Intermediate Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 15 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Enhance advanced defensive strategies against AI-powered attacks by understanding adversarial threat models and implementing robust security controls.

Course Overview

This intensive three-day course equips cybersecurity professionals to defend against AI-powered offensive tools and techniques. Organizations today face unprecedented challenges from automated, scalable, and sophisticated attacks from weaponized AI. Students will grasp the full spectrum of AI-enabled threats and understand how adversaries leverage machine learning, natural language processing, computer vision, and large language models to enhance attack capabilities.

In hands-on labs and real-world scenarios, students learn to identify AI attack signatures, implement defensive countermeasures, and develop comprehensive security architectures resistant to AI-powered threats, emphasizing practical, enterprise-ready defense strategies. By understanding offensive AI from an attacker's perspective, security professionals will be equipped to anticipate threats, build resilient defenses, and protect organizations in an era where AI is rapidly transforming the cybersecurity landscape.

What You'll Learn

  • Identify attack patterns unique to AI-powered threats
  • Deploy effective countermeasures against ML-based attacks
  • Strengthen security posture against adversarial AI systems
  • Perform threat hunting for AI-enabled malicious activity
  • Develop incident response plans for AI attack scenarios

Business Takeaways

  • Reduce organizational risk from AI-enabled cyber threats
  • Improve detection capabilities against novel attack vectors
  • Enhance security team readiness for emerging AI threats
  • Protect critical assets from advanced persistent threats
  • Strengthen compliance posture for AI security controls
  • Create robust security architecture resistant to AI attacks
  • Decrease incident response time for AI-powered attacks

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC535: Offensive AI - Attack Tools and Techniques.

Section 1Using AI for Reconnaissance and Social Engineering

Discover how threat actors leverage AI to gather intelligence and execute social engineering campaigns. Students explore advanced OSINT tools enhanced by machine learning, examine RAG-powered penetration testing workflows, and understand how adversaries craft personalized phishing attacks and convincing deepfakes to compromise enterprise security.

Topics covered

  • AI pen test assistant architectures
  • OSINT gathering with AI tools
  • Network reconnaissance automation
  • Social engineering attack psychology
  • Deepfake audio and video generation

Labs

  • AI-powered reconnaissance detection
  • Network discovery monitoring
  • PhishGPT simulation and defense
  • Deepfake audio identification
  • Vishing attack response protocols

Section 2AI-Driven Vulnerability Exploitation

Delve into how attackers weaponize AI to discover and exploit vulnerabilities. Participants will uncover how traditional exploitation frameworks evolve with machine learning, examine automated code analysis techniques, explore AI-enhanced memory manipulation attacks, and understand how intelligent patch analysis accelerates zero-day discovery.

Topics covered

  • AI-enhanced Metasploit frameworks
  • Automated SQL injection techniques
  • AI-assisted buffer overflow creation
  • Machine learning for exploit generation
  • Intelligent exploit adaptation systems

Labs

  • Metasploit defense configuration
  • SQL injection detection systems
  • Buffer overflow prevention mechanisms
  • Patch monitoring and alerting
  • AI-powered IDS/IPS implementation

Section 3Vulnerability Discovery, Automation Attacks, and Malware Development

Explore cutting-edge AI applications in malware engineering and defense evasion. Students learn how neural networks transform malware development, grasp how attackers circumvent AI safety guardrails, demonstrate sophisticated evasion techniques powered by machine learning, and examine living-off-the-land tactics enhanced through computational intelligence.

Topics covered

  • AI-assisted malware development
  • Proof-of-concept refinement techniques
  • ChatGPT safety restriction bypasses
  • EDR evasion with AI ghostwriting
  • LOLBin abuse with machine learning

Labs

  • Malware analysis and classification
  • Advanced EDR configuration tuning
  • LOLBin monitoring implementation
  • AI-based threat hunting procedures
  • Behavioral analysis system deployment

Things You Need To Know

Course Schedule & Pricing

Looking for Group Purchasing Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (live)

    Instructed by Foster Nethercott
    Date & Time
    Fetching schedule..View event details
    Course price
    $5,250 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Virtual (live)

    Instructed by Foster Nethercott
    Date & Time
    Fetching schedule..View event details
    Course price
    $5,250 USD*Prices exclude applicable local taxes
    Enrollment options
Showing 2 of 2

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources