Improving your cybersecurity using AI

4 Weeks

·

Cohort-based Course

Using AI to support Cybersecurity in the organization. What works and what doesn't? Use existing standard tools and AI.

Course overview

What transformation is expected within this course

The objective of this course is to enable you to improve security operations in your company by using standard tools like Google Workspace, Slack, Make, and others in combination with LLMs like ChatGPT, Claude, OLLAMA, or DeepSeek to increase the level of automation in them dramatically.


- You will get a clear roadmap for practical security implementation/improvement

- Knowledge of how to automate security processes that save time

- Ability to communicate security value to management

- Ready-to-use templates and frameworks

Who is this course for

01

CTOs, COOs and CISOs in startups and scale-ups willing to find out how to do their security work better

02

Project managers assigned to implement specific compliance requirements from regulations or customers

03

People who are willing to improve their usage of existing industry standard tools without buying a new security platform while saving time

04

This course is NOT for people looking to develop cybersecurity custom tools based on AI

What you’ll get out of this course

Improve your security operations with standard, not security-specific tools

Focusing on processes and using readily available standard tools, you will learn how to optimize your security operations and enhance your organization's overall cybersecurity posture.

Build effective cybersecurity automation with the help of flows and AI tooling

This course will enable you to build effective cybersecurity automation by teaching you how to create flows and use AI tooling to detect and respond to threats, manage risks, address compliance questions, and improve your organization's security state.

Become much better at understanding the parts of building great security operations

This course will guide you through common security operations processes, enable you to avoid typical missteps, and provide you with everything you need to be a better cybersecurity practitioner.

Understand the limitations of existing AI tools and what can / can not be expected from them

This course will help students understand the capabilities and limitations of existing AI tools in the context of cybersecurity, enabling them to make informed decisions about their implementation.

What’s included

Juris Puce

Live sessions

Learn directly from Juris Puce in a real-time, interactive format.

Lifetime access

Go back to course content and recordings whenever you need to.

Community of peers

Stay accountable and share insights with like-minded professionals.

Certificate of completion

Share your new skills with your employer or on LinkedIn.

Maven Guarantee

This course is backed by the Maven Guarantee. Students are eligible for a full refund up until the halfway point of the course.

Course syllabus

9 live sessions • 31 lessons • 4 projects

Week 1

Sep 8—Sep 14

    Mar

    3

    Optional: Welcome and Orientation

    Mon 3/36:00 PM—7:00 PM (UTC)
    Optional

    Introduction to Security Fundamentals

    2 items

    AI and Cybersecurity: State of Affairs

    3 items

    Stakeholder Expectations and Regulatory Alignment

    3 items

    Typical Pitfalls and Core Security Processes

    4 items

    Mar

    3

    Session 1

    Mon 3/37:00 AM—8:00 AM (UTC)
    Optional

    Mar

    6

    Session 2

    Thu 3/67:00 AM—8:00 AM (UTC)
    Optional

Week 2

Sep 15—Sep 21

    Mar

    10

    Session 3

    Mon 3/107:00 AM—8:00 AM (UTC)
    Optional

    Mar

    13

    Session 4

    Thu 3/137:00 AM—8:00 AM (UTC)
    Optional

    Tool configuration

    2 items

    Building Security Processes

    3 items

    Metrics Development

    3 items

Week 3

Sep 22—Sep 28

    Mar

    17

    Session 5

    Mon 3/177:00 AM—8:00 AM (UTC)
    Optional

    Mar

    20

    Session 6

    Thu 3/207:00 AM—8:00 AM (UTC)
    Optional

    Managing Routine Processes

    3 items

    Event Handling

    2 items

    Routine Security Activities

    3 items

Week 4

Sep 29

    Mar

    24

    Session 7

    Mon 3/247:00 AM—8:00 AM (UTC)
    Optional

    Conducting Security Reviews

    2 items

    Addressing Findings

    2 items

    Scaling and Improving Processes

    3 items

Post-course

    Mar

    27

    Session 8

    Thu 3/277:00 AM—8:00 AM (UTC)
    Optional

Bonus

    Access to a set of my Cybersecurty relevant Mindmaps and methodology

    0 items

What are they saying

        Juris‘ deep expertise in ISO/IEC 27001 made the training clear, practical, and highly effective.
Elisabeth Glaas

Elisabeth Glaas

Information Security @ KfW 
        I have attended several training sessions and webinars led by Juris Puce, and it is clear to me that any training under his guidance is an excellent investment for anyone looking to enhance their skills and knowledge in IT service management or cybersecurity. He has a talent for explaining complex topics in a simple and engaging way.
Sandra Zarina

Sandra Zarina

CISO, TNA

Meet your instructor

Juris Puce

Juris Puce

Hi, my name is Juris. I enjoy sharing the knowledge (including failures) I have accumulated in working with cybersecurity as a CISO, consultant, and auditor for the last twenty-plus years. 

I am a technology entrepreneur with almost 14 years of experience in AI, organizing development teams, and building software platforms, SaaS, fintech, and health tech companies. I hope to share practical examples of how to apply the cybersecurity "do's" and "do n'ts " and guide you on your journey.

I aim to make cybersecurity understandable and bring as many organizations and you as possible closer to a "state of cybersecurity."

A pattern of wavy dots

Be the first to know about upcoming cohorts

Improving your cybersecurity using AI

Course schedule

4-6 hours per week

  • Mondays & Wednesdays

    1:00pm - 2:00pm EST

    Regular check in to discuss what has happened, discuss open questions and and plan for the next part of the course

  • Weekly projects

    2 hours per week

    You will work on projects in different roles together with other course participants. The projects will provide you with direct applicability of the gained knowledge and allow you to explore tools and their applicability

Learning is better with cohorts

Learning is better with cohorts

Active hands-on learning

This course builds on live workshops and hands-on projects

Interactive and project-based

You’ll be interacting with other learners through breakout rooms and project teams

Learn with a cohort of peers

Join a community of like-minded people who want to learn and grow alongside you

Frequently Asked Questions

A pattern of wavy dots

Be the first to know about upcoming cohorts

Improving your cybersecurity using AI