AI for Security, Security for AI Training Course
Master the dual challenge of leveraging Artificial Intelligence for enhanced security operations while protecting AI systems from emerging threats. Enroll in our intensive hands-on training program where you will build real-world AI-powered security tools, implement enterprise-grade threat modeling systems, and develop frameworks for responsible AI deployment. Learn to create custom chatbots, automated security assessment platforms, and intelligent security co-pilots while understanding critical vulnerabilities in Large Language Model applications. This comprehensive program combines practical development skills with strategic security thinking, preparing you to evaluate AI vendors, implement governance frameworks, and lead AI security initiatives in your organization.
- Available in:
- Malaysia
Corporate Pricing
Pax:
Training Provider Pricing
Pax:
Features
Target Audience
Methodologies
Subsidies

What you'll learn
- Implement Retrieval Augmented Generation with custom security knowledge bases
- Build AI-powered security tools including chatbots and threat modeling systems
- Design agentic AI workflows for security co-pilots and incident response
- Establish responsible AI frameworks aligned with EU AI Act compliance requirements
- Develop Model Context Protocol servers for secure AI application integration
- Analyze and mitigate OWASP Top 10 risks for Large Language Model applications
- Create automated AWS security assessment tools using AI code generation
- Build governance processes for safely onboarding AI applications in enterprises
Why should you attend?
This comprehensive course bridges the critical intersection of artificial intelligence and cybersecurity, equipping participants with practical skills to leverage AI for security operations while understanding how to secure AI systems themselves. Participants will gain hands-on experience building AI-powered security tools, from simple chatbots to sophisticated threat modeling systems and automated security assessment platforms. The curriculum progresses through three intensive days, beginning with foundational concepts in generative AI and Large Language Models, then advancing to enterprise-grade application development and threat analysis. Participants will work directly with AWS AI services, implement Retrieval Augmented Generation systems with custom knowledge bases, and develop Model Context Protocol servers. Real-world applications include building AI-assisted threat modelers using STRIDE methodology, creating security questionnaire chatbots, and developing automated AWS security assessment tools. The course addresses critical security considerations throughout, including deep dives into the OWASP Top 10 for Large Language Model Applications, prompt injection vulnerabilities, and data poisoning risks. Participants will explore both Large Language Models and Small Language Models, understanding when each is appropriate for security contexts. Advanced topics include agentic AI workflows, building custom security co-pilots, and implementing responsible AI frameworks aligned with EU AI Act compliance requirements. By course completion, participants will have developed multiple functional security tools and established frameworks for safely onboarding AI applications within their organizations.
Course Syllabus
Day 1 - AI Fundamentals & Applications
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 1
Day 2 - AI Security & Threats
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 2
Day 3 - Responsible AI & Governance
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 3
Ratings and Reviews
Instructor
Dr. Esther Suria Kala is a highly accomplished ICT consultant and corporate trainer with nearly 30 years of extensive experience in information technology, project management, and organizational development. As the founder of Angel Software Solutions, she has established herself as a versatile and dedicated professional who delivers cutting-edge training solutions across Malaysia and internationally.
Her academic credentials are exceptional, including a PhD in Psychology with a focus on Human Behaviour and Human Resources, an MBA in Finance, and degrees in both Computer Science and Human Resources. Currently pursuing a second PhD in IT Information Security, Dr. Esther demonstrates an unwavering commitment to continuous learning and staying at the forefront of technological advancement. Her educational foundation is complemented by an impressive array of professional certifications, including Microsoft Certified Trainer (MCT), CISSP, ITIL, SAP Certified Associate, Certified Cyber Security Professional, Data Scientist, AI Engineering, and ECBA certifications.
Dr. Esther's technical expertise spans an extensive range of domains, from traditional programming languages like Java, C++, and PHP to modern technologies including Python, AI coding, machine learning, RPA, and IR 4.0 microservices. She is proficient in database management systems including Microsoft SQL Server and Oracle, web development frameworks, and enterprise solutions like SAP Crystal Reports and SharePoint Server. Her knowledge extends to cybersecurity, ethical hacking, network administration, and data analytics, making her uniquely qualified to address both technical and strategic business challenges.
As a trainer, Dr. Esther excels in bridging the gap between technical complexity and practical application. She delivers comprehensive training programs for both IT and non-IT professionals, covering everything from software development and cloud computing to soft skills such as digital marketing, business analysis, customer service, and project management. Her ability to communicate effectively in both English and Bahasa Malaysia enables her to connect with diverse audiences across different organizational levels.
Her impressive client portfolio includes leading organizations such as Maybank, Telekom Malaysia, Malaysian Airlines, Tenaga Nasional Berhad, Bank Negara, Ministry of Education, Ministry of Finance, and numerous multinational corporations. This extensive experience across banking, telecommunications, government, aviation, and technology sectors demonstrates her adaptability and deep understanding of varied industry requirements. Recognized with the Outstanding Achievement Award in Information Technology from University Malaya in 2013, Dr. Esther continues to empower organizations through innovative training solutions that drive digital transformation and professional excellence.
Instructor
Instructor
FAQ
Frequently Asked Questions About This Course
- Public pricing: applies for individuals signing up from different companies.
- Corporate pricing: applies if a company wants to have an intake for its employees only.
- Training provider pricing: applies only for other training providers looking to hire our trainers and use our content. Our content has a licensing fee.
We will keep you updated on the status of the intake after you enroll.
Courses you may like
Why should you attend?
This comprehensive course bridges the critical intersection of artificial intelligence and cybersecurity, equipping participants with practical skills to leverage AI for security operations while understanding how to secure AI systems themselves. Participants will gain hands-on experience building AI-powered security tools, from simple chatbots to sophisticated threat modeling systems and automated security assessment platforms. The curriculum progresses through three intensive days, beginning with foundational concepts in generative AI and Large Language Models, then advancing to enterprise-grade application development and threat analysis. Participants will work directly with AWS AI services, implement Retrieval Augmented Generation systems with custom knowledge bases, and develop Model Context Protocol servers. Real-world applications include building AI-assisted threat modelers using STRIDE methodology, creating security questionnaire chatbots, and developing automated AWS security assessment tools. The course addresses critical security considerations throughout, including deep dives into the OWASP Top 10 for Large Language Model Applications, prompt injection vulnerabilities, and data poisoning risks. Participants will explore both Large Language Models and Small Language Models, understanding when each is appropriate for security contexts. Advanced topics include agentic AI workflows, building custom security co-pilots, and implementing responsible AI frameworks aligned with EU AI Act compliance requirements. By course completion, participants will have developed multiple functional security tools and established frameworks for safely onboarding AI applications within their organizations.
What you'll learn
- Implement Retrieval Augmented Generation with custom security knowledge bases
- Build AI-powered security tools including chatbots and threat modeling systems
- Design agentic AI workflows for security co-pilots and incident response
- Establish responsible AI frameworks aligned with EU AI Act compliance requirements
- Develop Model Context Protocol servers for secure AI application integration
- Analyze and mitigate OWASP Top 10 risks for Large Language Model applications
- Create automated AWS security assessment tools using AI code generation
- Build governance processes for safely onboarding AI applications in enterprises
Course Syllabus
Day 1 - AI Fundamentals & Applications
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 1
Day 2 - AI Security & Threats
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 2
Day 3 - Responsible AI & Governance
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 3
Corporate Pricing
Pax:
Training Provider Pricing
Pax:
Features
Target Audience
Methodologies
Subsidies

Ratings and Reviews
Instructors
Dr. Esther Suria Kala is a highly accomplished ICT consultant and corporate trainer with nearly 30 years of extensive experience in information technology, project management, and organizational development. As the founder of Angel Software Solutions, she has established herself as a versatile and dedicated professional who delivers cutting-edge training solutions across Malaysia and internationally.
Her academic credentials are exceptional, including a PhD in Psychology with a focus on Human Behaviour and Human Resources, an MBA in Finance, and degrees in both Computer Science and Human Resources. Currently pursuing a second PhD in IT Information Security, Dr. Esther demonstrates an unwavering commitment to continuous learning and staying at the forefront of technological advancement. Her educational foundation is complemented by an impressive array of professional certifications, including Microsoft Certified Trainer (MCT), CISSP, ITIL, SAP Certified Associate, Certified Cyber Security Professional, Data Scientist, AI Engineering, and ECBA certifications.
Dr. Esther's technical expertise spans an extensive range of domains, from traditional programming languages like Java, C++, and PHP to modern technologies including Python, AI coding, machine learning, RPA, and IR 4.0 microservices. She is proficient in database management systems including Microsoft SQL Server and Oracle, web development frameworks, and enterprise solutions like SAP Crystal Reports and SharePoint Server. Her knowledge extends to cybersecurity, ethical hacking, network administration, and data analytics, making her uniquely qualified to address both technical and strategic business challenges.
As a trainer, Dr. Esther excels in bridging the gap between technical complexity and practical application. She delivers comprehensive training programs for both IT and non-IT professionals, covering everything from software development and cloud computing to soft skills such as digital marketing, business analysis, customer service, and project management. Her ability to communicate effectively in both English and Bahasa Malaysia enables her to connect with diverse audiences across different organizational levels.
Her impressive client portfolio includes leading organizations such as Maybank, Telekom Malaysia, Malaysian Airlines, Tenaga Nasional Berhad, Bank Negara, Ministry of Education, Ministry of Finance, and numerous multinational corporations. This extensive experience across banking, telecommunications, government, aviation, and technology sectors demonstrates her adaptability and deep understanding of varied industry requirements. Recognized with the Outstanding Achievement Award in Information Technology from University Malaya in 2013, Dr. Esther continues to empower organizations through innovative training solutions that drive digital transformation and professional excellence.
Courses you may like
FAQ
Frequently Asked Questions About This Course
- Public pricing: applies for individuals signing up from different companies.
- Corporate pricing: applies if a company wants to have an intake for its employees only.
- Training provider pricing: applies only for other training providers looking to hire our trainers and use our content. Our content has a licensing fee.
We will keep you updated on the status of the intake after you enroll.
Our Offers
Academy for Trainers Academy for Trainers
Teach what you love. Abundent Academy gives you the tools you need to run your own trainings! We provide you with the platform, the students, the materials, and the support you need to succeed!
- Higher trainer payouts
- Ready-made course materials
- Student management system
- AI digital marketing assistant
Academy for Corporates Academy for Corporates
Get unlimited access to all of Abundent Academy's carefully curated courses for your team, all organized according to learning paths and roles! Perfect for companies looking to upskill their workforce and stay ahead in the tech industry.
- Carefully curated courses
- Role-based learning paths
- Team progress tracking
- Gap Identification and Analysis
Academy for Partners Academy for Partners
White-label IT training delivery for training providers. We become your behind-the-scenes delivery arm so you can say yes to more clients without hiring more trainers.
- Expand your training catalog
- 40+ expert trainers ready
- White-label delivery
- You keep client relationships