DTSA 5739 Security and Ethical Hacking: Attacking Web and AI Systems

Same as CSCA 5323

  • Specialization: Security and Ethical Hacking
  • Instructor: Ahmed Hamza
  • Prior knowledge needed: 

 View on Coursera      Course Syllabus

Learning Outcomes

  • Perform and prevent web application attacks and knowledge of defensive techniques.
  • Understand AI/ML platform and model attacks as an extension of web attacks.
  • Describe the range of attacks on ML algorithms and systems.
  • Develop secure versions of artificial intelligence systems and tools.

Course Content

Duration: 10h

In this module, we introduce the protocols of the World Wide Web communication, history, and examine several important attack types targeting the server directly through vulnerabilities of web applications – including logic flaws not tied to a particular software weakness.  

Duration: 8h

In this module, we study exploit categories incorporating the client/browser (and assumed privileges of the client) in web attacks, including defenses and potential bypasses. 

Duration: 4h

Function-calling language models (AI agents) present unique risks. We practice attacks on live, deployed models that have excessive agency in their server environments, presenting modern, high-level exploitation primitive in web-deployed language agents. 

Duration: 3h

This module is an introduction and deep dive into more fundamental, algorithmic types of exploitation against AI systems, namely through study (and careful manipulation) of the machine learning models that power them. 

Duration: 2h 30m

You will complete a proctored exam worth 40% of your grade. You must attempt the final in order to earn a grade in the course. If you've upgraded to the for-credit version of this course, please make sure you review the additional for-credit materials in the Introductory module and anywhere else they may be found.

Note: This page is periodically updated. Course information on the Coursera platform supersedes the information on this page. Click View on Coursera button above for the most up-to-date information.