Our Knowledge Partner

Huntmetrics is a renowned Cyber Risk Advisory & Threat Intelligence company, specialized in Cyber Security & AI Security. Established in 2015 and having operations across seven countries, Huntmetrics boasts an impressive track record of successfully delivering cybersecurity projects for Government & Private Enterprises across diversified verticals such as Banking, Oil & Gas, Manufacturing, Healthcare, Telecom and Law Enforcement agencies


Roadmap to AI Security Engineer

Our specialized AI training syllabus acts as your guide to developing in-demand skills. We focus on both foundational concepts as well as the latest advanced methodologies. Through a combination of theoretical and hands-on learning, the curriculum provides you with everything required to kickstart your AI Security career.

  • Introduction to IT and its components
  • Operating systems and network basics
  • Data management and storage solutions

  • Understanding the Internet.
  • Deep insights on Network Topologies.
  • Networking essentials, protocols, and technologies.
  • LAN, WAN, and wireless network management.
  • Network design and topology, Protocols.

  • Managing physical and virtual servers.
  • Server provisioning and automation.
  • Load balancing and server redundancy.

  • Storage technologies (SAN, NAS, DAS).
  • Data backup and recovery strategies.
  • Scalable storage solutions.
  • Data Base provisioning

  • Public, private, and hybrid cloud management.
  • Cloud service models (IaaS, PaaS, SaaS).
  • Cost optimization and resource allocation.

  • Security best practices for IT infrastructure.
  • Firewall and intrusion detection systems.
  • Data encryption and access controls.

  • Software Development Lifecycle SDLC
  • A recap of programming basics.
  • Data types, variables, and control structures.

  • Introduction to programming languages (Python, JavaScript, etc.)
  • Scripting for automation and IT tasks
  • Security considerations in coding

  • Securing operating systems (Windows, Linux, etc.)
  • User access control, permissions, and privilege management
  • Patch management and vulnerability assessment.

  • Hardening server and endpoint devices.
  • Patch management and vulnerability scanning.
  • Secure configurations and access controls.
  • EDR, MDR & XDR Configurations

  • Securing network and wireless infrastructure and devices
  • Firewalls, intrusion detection systems, and intrusion prevention systems
  • Security of wireless networks

  • Web application security principles
  • Web application security assessment
  • Secure coding practices
  • Web application firewalls and security testing

  • Securing virtualized environments.
  • Cloud security risks and mitigation.
  • Identity and access management in the cloud.

  • Introduction to ethical hacking
  • Phases of Hacking
  • Penetration testing methodologies
  • Vulnerability assessment and reporting
  • OWASP Top 10
  • VAPT Tools

  • Social Engineering Tactics
  • Phishing, spearphishing, and pretexting.
  • Social engineering in physical settings.
  • Human psychology and manipulation techniques.

  • Understanding Attack Vectors
  • Website Security
  • Social Media Security
  • Payment Gateway Security
  • Digital Wallet Security
  • Mobile Security

  • SOC Fundamentals
  • SIEM Fundamental to Advance
  • SOC tools and training
  • SOC Use cases

  • Overview on Incident Response Management.
  • Stages of Incident Response.
  • Incident Response Vs Digital Forensics.
  • Digital forensics tools and methodologies
  • Evidence handling and chain of custody.

  • Reverse Engineering
  • MITRE Att&ck Framework
  • Behavior Analysis
  • Ransomware Analysis

  • Threat Hunting
  • Threat Modeling
  • Threat Mapping

  • Attack Exposure Management
  • Attack Path Discover
  • Attack Posture Assessment

  • Data Governance
  • Data Privacy Regulations (GDPR, DPDP Act)
  • Data Classification
  • Data Loss Prevention

  • Developing a disaster recovery plan.
  • Ensuring business continuity in case of disruptions.
  • Regular testing and plan updates.

  • Risk assessment and management.
  • Compliance standards (ISO 27001, NIST, COBIT etc.)
  • Security policies and documentation
  • GRC Tools and Software’s

  • OT Threat Landscape.
  • OT Architecture.
  • OT Attack Kill chain.
  • OT Attack Mitigation.
  • ISC/SCADA Security

  • Introduction to AI
  • Overview on GenAI
  • Prompt Engineering
  • LLM models

  • Definition and scope of AI security
  • Importance of securing AI systems
  • AI Trust Governance and Security
  • Cyberattacks on AI Models

  • Python fundamentals.
  • Scripting for security tasks.
  • Automating security operations.
  • Web scraping and data analysis for security purposes

  • Overview of adversarial attacks on AI models
  • Types of adversarial attacks (e.g., evasion, poisoning, model inversion)
  • Case studies on notable adversarial attacks
  • Understanding data poisoning attacks
  • Techniques for injecting malicious data into training datasets.
  • Mitigation strategies for data poisoning
  • Explanation of model inversion and reconstruction attacks
  • Vulnerabilities in model outputs and sensitive information leakage
  • Countermeasures against model inversion attacks

  • Introduction to AI System Architecture.
  • Network Security in AI system.
  • Data Security in AI system.
  • Data Privacy in AI system.
  • Cloud security for AI system.
  • End point security for AI system.
  • API Security for AI system.

  • Extend detection and response to bring AI into an organization's threat universe.
  • Automate defenses to keep pace with existing and new threats.
  • Harmonize platform level controls to ensure consistent security.
  • Adapt controls to adjust mitigations and create faster feedback loops for AI deployment.

  • Thorough understanding of ISO/IEC 420012023 and its application
  • Importance and benefits of ISO/IEC 420012023 in AI security
  • Scope and purpose of the Standard
  • Ability to implement and manage an AI security management system.

  • Protecting sensitive data in AI systems.
  • Privacypreserving techniques in data preprocessing.
  • Secure Data Storage and Transmission.
  • Secure storage of AI datasets

  • Comprehensive understanding of AI risk management principles and practices
  • Skills to identify, analyze, and mitigate risks in AI implementation & Integration.
  • Ability to implement an AI risk management plan.

  • Indepth understanding of security challenges in AI deployment.
  • Setting Up Secure AI Deployment Infrastructure.
  • Ability to implement secure AI development and deployment practices.
  • Access to AI Deployment Tools and Platforms.

  • Understanding the processes and challenges in AI integration
  • Overview of AI Integration in Business Systems.
  • Understanding the AI Integration Lifecycle
  • Knowledge of compliance and ethical considerations in AI integration

  • Deep understanding of the importance of data quality and integrity in AI.
  • Knowledge of data poisoning risks and mitigation strategies.
  • Ability to develop comprehensive data quality management plans.
  • Introduction to Data Poisoning in Machine Learning

  • Comprehensive understanding of AI security risks and their impacts
  • Skills in conducting thorough AI security risk assessments.
  • Ability to develop and implement risk mitigation strategies

  • Indepth understanding of penetration testing methodologies for AI systems.
  • Identifying vulnerabilities and weaknesses.
  • Crafting AISpecific Attack Strategies.
  • Skills to identify and exploit vulnerabilities in AI systems.
  • Ability to develop strategies for strengthening the security of AI systems.

  • Comprehensive understanding of AI breach incident response management.
  • Detection and Analysis of AI Breaches
  • Containment, Eradication, and Recovery.
  • Preparation and Planning for AI Breach Response.
  • Skills in developing and implementing AIspecific incident response plans.
  • Ability to analyze and respond to AI security incidents effectively.

  • Indepth understanding of AI security operations Management
  • Skills in setting up and managing AI security operations.
  • AI System Health and Availability Monitoring and management.
  • AI Model Management and Version Control.

  • Applied AI Security Challenge.
  • AI Security War Room
  • AI System Vulnerability Assessment and Mitigation Plan.
  • AI Data Poisoning Simulation and Defense Strategy

The Path to Mastering
AI Security

Gyan Khand provides the most effective way to become an AI Security Engineer. Our comprehensive industry-vetted curriculum focuses on hands-on, practical learning so you become job ready.

Pioneers in AI Security Training

First in India to provide specialized education in AI Security. Be at the forefront of this emerging field.

Cutting Edge Curriculum

Industry-vetted content keeps our curriculum up-to-date, always aligning to in-demand skills that employers seek

Learn from Experts

Guidance from seasoned AI professionals ensures you benefit from their extensive insider knowledge and experience.

80% Practical Learning

With a focus on hands-on approach, over 80% of class time is devoted to working on hyper real-time simulator.

Real-World Projects

Learn through Industry use cases and scenarios modeled after the Real-World challenges.

Peer Learning

Promoting peer learning and collaboration results in greater engagement and more impactful lessons.

Industry-Standard Tools

Master the same simulators, tools, and platforms as leading professionals apply in the industry.

Placement Assistance

Connecting learners to exciting opportunities at innovative companies to launch their career.

Unbeatable Value

Our reasonable rates make the high caliber of training open to more aspiring learners.

Our State-of-the-Art Infrastructure


Our Industry Expert Trainers

Shaik Abdulkhader

Shaik Abdulkhader is a visionary cybersecurity leader with over 25 years of experience, boasting exceptional proficiency in cybersecurity, IT, and emerging technologies like IoT and IIoT. With a notable track record as a Chief Information Security Officer (CISO) at prominent organizations such as Qatar Petrochemical Company and Vodafone, he has demonstrated his prowess in establishing robust enterprise information security and risk management programs. His expertise spans Information Security Governance, SIEM, IAM, and Incident Crisis Management. With a rich background encompassing roles at Tata Consultancy Services and leading banks, Shaik brings unparalleled insight and strategic foresight to our cybersecurity courses.

Bheem Reddy

Cdr Bheem Reddy is an entrepreneur and a veteran Indian Navy officer, having served for over 22 years. During his stint in the Indian Navy, Bheem had spent over 8 years in combat role at sea, he had carried out diplomatic and overseas assignments for India in 5 countries. Whilst in service he had specialised in the IT and Cybersecurity. He is also an alumnus of IIM Lucknow, JBIMS Mumbai and the prestigious Indian Naval War College Goa.

During his illustrious Naval career, Bheem had steered large scale projects of national Security importance, including establishment of Security Operations Centre for Indian Navy and has published policy level documents for the Ministry of Defence.

Bheem is currently an entrepreneur. He is the Founder and Chief Executive Officer of an ed-tech Startup with brand name ‘The Hacker Central’ that is focussed on Cybersecurity skill development and is working towards bridging the large skill gap in the Cybersecurity industry. The Startup is currently into providing quality skill training and higher education in Cybersecurity and is partnered with various Universities such as MIT University Pune, DY Patil International University.

Vinod Babu B

Vinod Babu B is a seasoned trainer and speaker with over two decades of IT experience, currently pursuing a PhD in Computer Science from KL University. With an MTech from BITS Pilani and numerous cybersecurity certifications, he possesses a wealth of knowledge in areas including threat intelligence, web application vulnerability testing, and digital forensics. Vinod has delivered cybersecurity training and consulting projects in India, USA, UAE, Saudi Arabia, Thailand, Singapore, Malaysia, Sri Lanka, Cambodia, Netherlands, showcasing his expertise to senior IT teams in Corporate, Government, and Banking sectors. His specialization in Takedown Services for online abuse underscores his commitment to combatting cyber threats and safeguarding digital platforms.



Tools you will learn in this course

  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia
  • Nivia

Course Enquiry

Please complete the form with your details. Upon submission, you will receive a download link for the brochure