1.5 ยท AI Incident Response & Security GovernanceVideo

Course 1 Complete โ€” What You've Built

โฑ 3 minCourse 01

Congratulations on completing Course 1 โ€” AI Security & Attack Surface Management.

What You Now Know

  • โ—†The full AI attack surface across the model lifecycle โ€” data, training, deployment, integration
  • โ—†Why traditional cybersecurity tools cannot detect AI-specific threats
  • โ—†The four adversarial attack types and the defences for each
  • โ—†How training data poisoning works and how to protect your training pipelines
  • โ—†The risk of model memorisation and its GDPR implications
  • โ—†How to assess and manage your AI supply chain
  • โ—†What prompt injection and jailbreaking are and how to build LLM deployments that resist them
  • โ—†How to detect, classify, and respond to AI security incidents
  • โ—†The five pillars of AI security governance

If you're ready to go further, Course 2 covers the regulatory and governance side โ€” the EU AI Act, GDPR, compliance frameworks, and how to build an AI governance programme that satisfies both regulators and your board.

โœ“ Your Next Step

Before moving to Course 2, take 20 minutes to build your AI system inventory. Even a rough first version โ€” a list of every AI tool your organisation uses, who owns it, and what data it touches โ€” will transform your ability to apply everything in this course.