Coursera

AI Security: Security in the Age of Artificial Intelligence Specialization

Coursera

AI Security: Security in the Age of Artificial Intelligence Specialization

Build Secure AI Systems End-to-End.

Learn to identify, prevent, and respond to AI-specific threats across the entire ML lifecycle.

Reza Moradinezhad
Starweaver
Ritesh Vajariya

Instructors: Reza Moradinezhad

Included with Coursera Plus

Get in-depth knowledge of a subject
Intermediate level

Recommended experience

4 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Get in-depth knowledge of a subject
Intermediate level

Recommended experience

4 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Secure AI systems using static analysis, threat modeling, and vulnerability assessment techniques

  • Implement production security controls including monitoring, incident response, and patch management

  • Conduct red-teaming exercises and build resilient defenses against AI-specific attack vectors

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

January 2026

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Coursera

Specialization - 13 course series

Secure AI Code & Libraries with Static Analysis

Secure AI Code & Libraries with Static Analysis

Course 1, 4 hours

What you'll learn

  • Configure Bandit, Semgrep, PyLint to detect AI vulnerabilities: insecure model deserialization, hardcoded secrets, unsafe system calls in ML code.

  • Apply static analysis to fix AI vulnerabilities (pickle exploits, input validation, dependencies); create custom rules for AI security patterns.

  • Implement pip-audit, Safety, Snyk for dependency scanning; assess AI libraries for vulnerabilities, license compliance, and supply chain security.

Skills you'll gain

Category: AI Security
Category: Vulnerability Scanning
Category: Dependency Analysis
Category: Continuous Integration
Category: Application Security
Category: CI/CD
Category: Program Implementation
Category: AI Personalization
Category: MLOps (Machine Learning Operations)
Category: Vulnerability Assessments
Category: Threat Modeling
Category: Open Source Technology
Category: Security Testing
Category: DevSecOps
Category: Secure Coding
Category: Analysis
Category: Supply Chain
Category: PyTorch (Machine Learning Library)
Secure AI: Threat Model & Test Endpoints

Secure AI: Threat Model & Test Endpoints

Course 2, 4 hours

What you'll learn

  • Analyze and evaluate AI inference threat models, identifying attack vectors and vulnerabilities in machine learning systems.

  • Design and implement comprehensive security test cases for AI systems including unit tests, integration tests, and adversarial robustness testing.

  • Integrate AI security testing into CI/CD pipelines for continuous security validation and monitoring of production deployments.

Skills you'll gain

Category: Security Testing
Category: AI Security
Category: Threat Modeling
Category: DevSecOps
Category: Exploitation techniques
Category: Data Validation
Category: Continuous Monitoring
Category: Unit Testing
Category: Scripting Languages
Category: API Testing
Category: Threat Detection
Category: Continuous Integration
Category: Integration Testing
Category: Test Script Development
Category: CI/CD
Category: Scripting
Category: DevOps
Category: Endpoint Security
Optimize AI Inference Speed & Accuracy

Optimize AI Inference Speed & Accuracy

Course 3, 4 hours

What you'll learn

  • Analyze inference bottlenecks to identify optimization opportunities in production ML systems.

  • Implement model pruning techniques to reduce computational complexity while maintaining acceptable accuracy.

  • Apply quantization methods and benchmark trade-offs for secure and efficient model deployment.

Skills you'll gain

Category: Model Optimization
Category: Project Performance
Category: Benchmarking
Category: Network Model
Category: Keras (Neural Network Library)
Category: Process Optimization
Category: AI Security
Category: Cloud Deployment
Category: Model Deployment
Category: Model Evaluation
Category: Numerical Analysis
Category: Model Training
Harden AI: Secure Your ML Pipelines

Harden AI: Secure Your ML Pipelines

Course 4, 5 hours

What you'll learn

  • Apply infrastructure hardening in ML environments using secure setup, IAM controls, patching, and container scans to protect data.

  • Secure ML CI/CD workflows through automated dependency scanning, build validation, and code signing to prevent supply chain risks.

  • Design resilient ML pipelines by integrating rollback, drift monitoring, and adaptive recovery to maintain reliability and system trust.

Skills you'll gain

Category: Data Integrity
Category: AI Security
Category: CI/CD
Category: Vulnerability Scanning
Category: Application Security
Category: Resilience
Category: MLOps (Machine Learning Operations)
Category: Anomaly Detection
Category: AI Personalization
Category: DevSecOps
Category: Engineering
Category: Hardening
Category: Security Controls
Category: Continuous Monitoring
Category: Infrastructure Security
Category: Responsible AI
Category: Vulnerability Assessments
Category: Compliance Management
Category: Cyber Governance
Category: Identity and Access Management
Secure AI Model Deployments & Lifecycles

Secure AI Model Deployments & Lifecycles

Course 5, 4 hours

What you'll learn

  • Execute secure deployment strategies (blue/green, canary, shadow) with traffic controls, health gates, and rollback plans.

  • Implement model registry governance (versioning, lineage, stage transitions, approvals) to enforce provenance and promote-to-prod workflows.

  • Design monitoring triggering runbooks; secure updates via signing + CI/CD policy for auditable releases and controlled rollback.

Skills you'll gain

Category: AI Security
Category: Model Deployment
Category: Metadata Management
Category: Incident Response
Category: Cloud Deployment
Category: Artificial Intelligence and Machine Learning (AI/ML)
Category: CI/CD
Category: DevOps
Category: Software Versioning
Category: System Monitoring
Category: AI Workflows
Category: MLOps (Machine Learning Operations)
Secure AI Interpret and Protect Models

Secure AI Interpret and Protect Models

Course 6, 5 hours

What you'll learn

  • Analyze and identify a range of security vulnerabilities in complex AI models, including evasion, data poisoning, and model extraction attacks.

  • Apply defense mechanisms like adversarial training and differential privacy to protect AI systems from known threats.

  • Evaluate the effectiveness of security measures by designing and executing simulated adversarial attacks to test the resilience of defended AI model.

Skills you'll gain

Category: AI Security
Category: Continuous Monitoring
Category: Security Strategy
Category: Security Requirements Analysis
Category: Design
Category: Security Architecture Review
Category: IT Security Architecture
Category: Security Controls
Category: Generative Adversarial Networks (GANs)
Category: Vulnerability Assessments
Category: Hardening
Category: Threat Modeling
Category: Analysis
Category: Information Privacy
Category: Model Evaluation
Category: Data Integrity
Category: Data Validation
Category: Security Engineering
Category: Security Testing
Category: Model Training
Secure AI with Privacy and Access Controls

Secure AI with Privacy and Access Controls

Course 7, 4 hours

What you'll learn

  • Analyze real-world AI security, privacy, and access control risks to understand how these manifest in their own organizations.

  • Design technical controls and governance frameworks to secure AI systems, guided by free tools and industry guidelines.

  • Assess privacy laws' impact on AI, draft compliant policies, and tackle compliance challenges.

Skills you'll gain

Category: AI Security
Category: Role-Based Access Control (RBAC)
Category: Threat Modeling
Category: Generative AI
Category: Data Security
Category: Security Controls
Category: Incident Response
Category: General Data Protection Regulation (GDPR)
Category: Security Awareness
Category: Risk Management Framework
Category: Cyber Security Policies
Category: Data Loss Prevention
Category: Authorization (Computing)
Category: Cyber Governance
Category: Data Governance
Category: Information Privacy
Category: Personally Identifiable Information
Category: Identity and Access Management
Category: Responsible AI
Category: Governance
Secure AI: Red-Teaming & Safety Filters

Secure AI: Red-Teaming & Safety Filters

Course 8, 4 hours

What you'll learn

  • Design red-teaming scenarios to identify vulnerabilities and attack vectors in large language models using structured adversarial testing.

  • Implement content-safety filters to detect and mitigate harmful outputs while maintaining model performance and user experience.

  • Evaluate and enhance LLM resilience by analyzing adversarial inputs and developing defense strategies to strengthen overall AI system security.

Skills you'll gain

Category: AI Security
Category: Continuous Monitoring
Category: Responsible AI
Category: Security Testing
Category: Vulnerability Assessments
Category: Threat Modeling
Category: Prompt Engineering
Category: Security Strategy
Category: Cyber Security Assessment
Category: Exploitation techniques
Category: System Implementation
Category: Vulnerability Scanning
Category: LLM Application
Category: AI Personalization
Category: Large Language Modeling
Category: Security Controls
Secure AI Systems Across Lifecycle Stages

Secure AI Systems Across Lifecycle Stages

Course 9, 3 hours

What you'll learn

  • Identify and classify various classes of attacks targeting AI systems.

  • Analyze the AI/ML development lifecycle to pinpoint stages vulnerable to attack.

  • Apply threat mitigation strategies and security controls to protect AI systems in development and production.

Skills you'll gain

Category: AI Security
Category: Model Training
Category: Data Integrity
Category: Threat Modeling
Category: Artificial Intelligence and Machine Learning (AI/ML)
Category: Data Security
Category: MITRE ATT&CK Framework
Category: Vulnerability Assessments
Category: Security Controls
Category: Threat Management
Category: Security Testing
Category: Model Deployment
Category: Application Lifecycle Management
Category: MLOps (Machine Learning Operations)
Category: Secure Coding
Automate AI Anomaly Detection & Response

Automate AI Anomaly Detection & Response

Course 10, 4 hours

What you'll learn

  • Apply machine learning techniques to detect anomalies in cybersecurity data such as logs, network traffic, and user behavior.

  • Automate incident response workflows by integrating AI-driven alerts with security orchestration tools.

  • Evaluate and fine-tune AI models to reduce false positives and improve real-time threat detection accuracy.

Skills you'll gain

Category: Incident Management
Category: Application Performance Management
Category: Anomaly Detection
Category: Generative AI
Category: Process Optimization
Category: Query Languages
Category: Event Monitoring
Category: Microsoft Azure
Category: Time Series Analysis and Forecasting
Category: Data Integration
Category: Data Analysis
Category: User Feedback
Harden AI: Patch and Recover Incidents Fast

Harden AI: Patch and Recover Incidents Fast

Course 11, 4 hours

What you'll learn

  • Apply systematic patching strategies to AI models, ML frameworks, and dependencies while maintaining service availability and model performance.

  • Conduct blameless post-mortems for AI incidents using structured frameworks to identify root causes, document lessons learned, and prevent recurrence

  • Set up monitoring, alerts, and recovery to detect and resolve model drift, performance drops, and failures early.

Skills you'll gain

Category: Patch Management
Category: Dependency Analysis
Category: Incident Response
Category: Incident Management
Category: Dashboard Creation
Category: Model Deployment
Category: System Monitoring
Category: Disaster Recovery
Category: Computer Security Incident Management
Category: Problem Management
Category: Automation
Category: Application Deployment
Category: Package and Software Management
Category: MLOps (Machine Learning Operations)
Category: Site Reliability Engineering
Category: Anomaly Detection
Category: Continuous Monitoring
Category: AI Security
Secure Mobile AI Models Against Attacks

Secure Mobile AI Models Against Attacks

Course 12, 4 hours

What you'll learn

  • Explain the fundamentals of deploying AI models on mobile applications, including their unique performance, privacy, and security considerations.

  • Analyze threats to mobile AI models like reverse engineering, adversarial attacks, and privacy leaks and their effect on reliability and trust.

  • Design a layered defense strategy for securing mobile AI applications by integrating encryption, obfuscation, and continuous telemetry monitoring.

Skills you'll gain

Category: AI Security
Category: Continuous Monitoring
Category: Mobile Security
Category: Encryption
Category: Security Controls
Category: Model Deployment
Category: Responsible AI
Category: Threat Modeling
Category: Anomaly Detection
Category: Hardening
Category: Program Implementation
Category: Security Management
Category: Threat Management
Category: Threat Detection
Category: Application Security
Category: Mobile Development
Category: Secure Coding
Category: System Monitoring
Detect & Respond to Mobile AI Threats

Detect & Respond to Mobile AI Threats

Course 13, 4 hours

What you'll learn

  • Analyze how AI features like sensors, models, and agents make phones attack surfaces and enable deepfake-based scams.

  • Evaluate technical attack paths—zero-permission inference and multi-layer agent attacks—using real research cases.

  • Design a mobile-focused detection and response plan with simple rules, containment steps, and key resilience controls.

Skills you'll gain

Category: Mobile Security
Category: Incident Response
Category: AI Security
Category: Threat Detection
Category: Hardening
Category: AI literacy
Category: Security Controls
Category: Mobile Development Tools
Category: Malware Protection
Category: Human Factors (Security)
Category: Threat Modeling
Category: Exploitation techniques
Category: Information Privacy
Category: Artificial Intelligence
Category: Prompt Engineering
Category: Endpoint Security
Category: Intrusion Detection and Prevention

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructors

Reza Moradinezhad
Coursera
6 Courses4,903 learners
Starweaver
Coursera
558 Courses1,089,781 learners
Ritesh Vajariya
Coursera
27 Courses21,516 learners

Offered by

Coursera

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions