Certified - AI Security Audio Course

By Jason Edwards

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Jason Edwards

Category: Courses

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 1
Reviews: 0
Episodes: 51

Description

The AI Security & Threats Audio Course is a comprehensive, audio-first learning series focused on the risks, defenses, and governance models that define secure artificial intelligence operations today. Designed for cybersecurity professionals, AI practitioners, and certification candidates, this course translates complex technical and policy concepts into clear, practical lessons. Each episode explores a critical aspect of AI security—from prompt injection and model theft to data poisoning, adversarial attacks, and secure machine learning operations (MLOps). You’ll gain a structured understanding of how vulnerabilities emerge, how threat actors exploit them, and how robust controls can mitigate these evolving risks. The course also covers the frameworks and best practices shaping AI governance, assurance, and resilience. Learners will explore global standards and regulatory guidance, including NIST AI Risk Management Framework, ISO/IEC 23894, and emerging organizational policies around transparency, accountability, and continuous monitoring. Through practical examples and scenario-driven insights, you’ll learn how to assess model risk, integrate secure development pipelines, and implement monitoring strategies that ensure trust and compliance across the AI lifecycle. Developed by BareMetalCyber.com, the AI Security & Threats Audio Course blends foundational security knowledge with real-world application, helping you prepare for advanced certifications and leadership in the growing field of AI assurance. Explore more audio courses, textbooks, and cybersecurity resources at BareMetalCyber.com—your trusted source for structured, expert-driven learning.

Episode Date
Welcome to the AI Security Course
Oct 14, 2025
Episode 50 — Automated Adversarial Generation
Sep 15, 2025
Episode 49 — Confidential Computing for AI
Sep 15, 2025
Episode 48 — Guardrails Engineering
Sep 15, 2025
Episode 47 — On-Device & Edge AI Security
Sep 15, 2025
Episode 46 — Multimodal & Cross-Modal Security
Sep 15, 2025
Episode 45 — Program Management Patterns (30/60/90)
Sep 15, 2025
Episode 44 — People & Process
Sep 15, 2025
Episode 43 — Enterprise Architecture Patterns
Sep 15, 2025
Episode 42 — Third-Party & Vendor Risk
Sep 15, 2025
Episode 41 — Legal & Compliance Horizon (High-Level)
Sep 15, 2025
Episode 40 — Content Provenance & Watermarking
Sep 15, 2025
Episode 39 — Deepfakes & Synthetic Media Risk
Sep 15, 2025
Episode 38 — Incident Response for AI Events
Sep 15, 2025
Episode 37 — Secure SDLC for AI
Sep 15, 2025
Episode 36 — OWASP GenAI/LLM Top 10
Sep 15, 2025
Episode 35 — Threat Modeling for AI
Sep 15, 2025
Episode 34 — Risk Frameworks in Practice
Sep 15, 2025
Episode 33 — Governance & Acceptable Use
Sep 15, 2025
Episode 32 — Keys, Encryption & Attestation
Sep 15, 2025
Episode 31 — Cloud & Infra for AI
Sep 15, 2025
Episode 30 — Connector/Plugin Security
Sep 15, 2025
Episode 29 — Code Execution & Sandboxing
Sep 15, 2025
Episode 28 — API Gateways & Proxies for AI
Sep 15, 2025
Episode 27 — Secure Fine-Tuning & Adaptation
Sep 15, 2025
Episode 26 — Supply Chain & Artifacts
Sep 15, 2025
Episode 25 — MLOps & Serving Security
Sep 15, 2025
Episode 24 — Cost & Resource Abuse
Sep 15, 2025
Episode 23 — Abuse & Fraud Detection
Sep 15, 2025
Episode 22 — Telemetry & Observability
Sep 15, 2025
Episode 21 — Evals & Test Pipelines
Sep 15, 2025
Episode 20 — Red Teaming Strategy for GenAI
Sep 15, 2025
Episode 19 — Output Validation & Policy Enforcement
Sep 15, 2025
Episode 18 — AuthN/Z for LLM Apps
Sep 15, 2025
Episode 17 — Secrets & Credential Hygiene
Sep 15, 2025
Episode 16 — Agents as an Attack Surface
Sep 15, 2025
Episode 15 — RAG Security II: Context Filtering & Grounding
Sep 15, 2025
Episode 14 — RAG Security I: Retrieval & Index Hardening
Sep 15, 2025
Episode 13 — Adversarial Evasion
Sep 15, 2025
Episode 12 — Model Theft & Extraction
Sep 15, 2025
Episode 11 — Privacy-Preserving Techniques
Sep 15, 2025
Episode 10 — Privacy Attacks
Sep 15, 2025
Episode 9 — Training-Time Integrity
Sep 15, 2025
Episode 8 — Data Poisoning Attacks
Sep 15, 2025
Episode 7 — Content Safety vs. Security
Sep 15, 2025
Episode 6 — Prompt Security II: Indirect & Cross-Domain Injections
Sep 15, 2025
Episode 5 — Prompt Security I: Injection & Jailbreaks
Sep 15, 2025
Episode 4 — Data Lifecycle Security
Sep 15, 2025
Episode 3 — System Architecture & Trust Boundaries
Sep 15, 2025
Episode 2 — The AI Security Landscape
Sep 15, 2025
Episode 1 — Course Overview & How to Use This Prepcast
Sep 15, 2025