AI Powered Cybersecurity

-39% English

AI Powered Cybersecurity

كانون الأول 5, 2025
4.38 /5
(8)
0 already enrolled

Course Prerequisites

Please note that this course has the following prerequisites which must be completed before it can be accessed

About This Course

As cyber threats grow in frequency and complexity organizations around the world face an urgent need for professionals who can secure digital infrastructure using advanced technologies like artificial intelligence The demand for cybersecurity experts with AI expertise is soaring yet there remains a shortage of qualified talent equipped to combine technical analytical and strategic defense skills The MicroMasters in AI in Cybersecurity called AIPowered Cybersecurity is developed by the University of Jordan to address these global skills gaps through a handson interdisciplinary approach The program is structured around four specialization tracks each comprising four carefully designed courses and a capstone project All learners complete the core courses on cybersecurity foundations and AI followed by two advanced courses aligned with their chosen track This design ensures students not only gain foundational knowledge but also build specialized expertise in areas like threat detection ethical hacking or AIdriven defense systems Cybersecurity AI Analyst AI is structured as a credit hour program over two semesters it caters to university students IT or nonIT majors high school graduates recent graduates and working professionals aiming to transition into tech fields

Learning Objectives

Learning Objectives

Target Audience

This program welcomes University students IT or nonIT Recent graduates Working professionals seeking tech transitions High school graduates exploring techfocused careers

Curriculum

CURRICULUM MATERIAL
General AIPowered Cybersecurity AICS Ethical Hacking AI in Incident Response AICS Adversarial Machine Learning Threat Detection Analytics AICS AIDriven Threat Detection Analysis AICS Adversarial Machine Learning Ethical Hacking Response AICS Ethical Hacking AI in Incident Response AICS Network Security Protocol Analysis AI for Cyber Defense Systems AICS AIDriven Threat Detection Analysis AICS Ethical Hacking AI in Incident Response

CURRICULUM METHODOLOGY
Hybrid Online and Oncampus Includes handson labs guest lectures and a final capstone

Your Instructors

Loai Medhat Awni al-nemer

42 Courses