PROFESSIONAL · SOC TRACK

Certified AI SecOps Professional

A 3-day, hands-on certification that equips SOC professionals to leverage AI for faster threat detection, automated incident response, and intelligent threat hunting — while defending the SOC against adversarial AI.

Duration
3 Days
Pass Score
70%
Format
Hands-on
Exam
90 Min
// OVERVIEW

AI is the SOC's most powerful ally — and its newest attack surface.

Defensively, AI processes security telemetry at a scale no human team can match — correlating alerts that would take analysts hours to connect and executing standard playbooks in seconds. Offensively, AI-generated phishing achieves dramatically higher engagement rates, prompt injection compromises AI-based security tools, and adversarial techniques evade ML-based detection models.

This programme covers both offensive AI threats and defensive AI capabilities in a single cohesive curriculum. Participants build hands-on competency with industry tools — Elastic SIEM, Splunk, TryHackMe, MITRE ATT&CK / ATLAS Navigator and Claude.ai — while developing the governance literacy to operate responsibly in regulated environments.

Aligned to the Singapore Smart Nation initiative and SkillsFuture for Digital Workplace objectives, the Certified AI SecOps Professional course prepares participants for modern SOC roles in financial services, healthcare, critical infrastructure and enterprise.

// WHAT'S IN IT FOR YOU

Skills you'll gain

  • Leverage AI-powered SIEM platforms for real-time threat correlation and intelligent alert prioritisation, significantly reducing Mean Time to Detect (MTTD).
  • Implement SOAR automation with human-in-the-loop governance for governed, auditable security operations.
  • Use Large Language Models (LLMs) and AI tools for threat intelligence analysis, log query generation, and investigation acceleration.
  • Understand and defend against adversarial AI threats including prompt injection, model poisoning, and AI-generated phishing attacks.
  • Design AI governance frameworks for security operations: audit trails, explainability requirements, and accountability structures.
  • Apply MITRE ATT&CK and MITRE ATLAS, NIST AI RMF, and MAS FEAT principles to AI-assisted security operations.
// OUTCOMES

After certification you'll be able to

  • Configure AI-enhanced SIEM platforms for intelligent detection, UEBA-based anomaly detection, and alert prioritisation.
  • Implement AI-assisted incident triage and SOAR automation workflows incorporating appropriate human approval gates.
  • Use LLM tools for threat intelligence analysis, MITRE ATT&CK / ATLAS technique mapping, and security log query generation.
  • Identify and assess adversarial AI attack vectors and harden AI-based security tools against compromise.
  • Conduct AI-assisted threat hunting exercises and evaluate detection coverage gaps.
  • Apply NIST AI RMF, MAS FEAT and AI Verify governance frameworks to AI-augmented security operations.
// COURSE OUTLINE

Three days. Five modules. Built on real SOC tooling.

01
Day 01

Foundations of AI in Security Operations

  • Machine Learning in Cybersecurity — A Practitioner's Perspective
  • User and Entity Behaviour Analytics (UEBA)
  • AI Features in Leading SIEM Platforms (Elastic, Splunk)
  • Agentic Security Operations via MCP (Model Context Protocol)
  • Lab: Configure UEBA & AI anomaly detection in Elastic SIEM
02
Day 02

AI-Assisted Incident Response & SOC Automation

  • AI for Incident Triage and Alert Enrichment
  • SOAR Platforms with AI Integration
  • LLM Tools for Threat Intelligence and Investigation
  • ChatOps for AI-Augmented SOC Operations
  • Lab: Build an AI-augmented IR workflow for a ransomware scenario
03
Day 03

Adversarial AI, Threat Hunting & Governance

  • AI-Powered Attack Vectors & Adversarial AI Techniques
  • Defending AI Security Systems
  • AI-Assisted Threat Hunting & Hunt Execution
  • AI Governance: NIST AI RMF, MAS FEAT, AI Verify
  • Capstone: AI SOC Design Exercise
// HANDS-ON TOOLS

Industry-standard SOC tooling, end-to-end.

Elastic SIEM

Ingest log samples; configure detection rules; implement ML anomaly detection.

Splunk

AI-assisted search, UBA correlation and SIEM dashboard design.

TryHackMe

AI-focused SOC rooms, SIEM exercises and incident response scenarios.

MITRE ATT&CK / ATLAS Navigator

Map adversary TTPs and build detection-coverage heatmaps.

Claude.ai

AI threat analyst — log triage, runbook generation, threat actor profiling.

MISP, OpenCTI, Maltego, Shodan, VirusTotal, SpiderFoot

Open-source threat intelligence and OSINT tooling.

Integrated Hands-On Labs

Cloud-accessible lab environment with Elastic SIEM, Splunk, MITRE Navigator and Claude.ai. Sector case studies span financial services, healthcare, government and critical national infrastructure.

Certification Exam

  • 90-minute MCQ assessment
  • 70% passing score
  • ISO 17024 certified credential
  • 3-day intensive programme (24 hours)
// TARGET AUDIENCE

Built for the SOC of the AI era.

Pre-requisites: At least 1 year of cybersecurity or IT security experience, familiarity with core security concepts and basic networking / OS knowledge. Prior SIEM exposure is helpful but not required.

SOC Analysts (Tier 1, 2 and 3)
Incident Responders
Security Operations Engineers
Threat Intelligence Analysts
SOC Managers & Team Leads
Security Operations Architects
IT Professionals moving into SecOps
Cyber Defenders in regulated sectors
// ALUMNI VOICES

What CAISO alumni say.

"CAISO transformed how we triage AI-generated alerts. Our SOAR playbooks now route LLM-related incidents through dedicated AI workflows."
R
Rahul B.
SOC Manager · Telco, Singapore
"Hands-on labs on adversarial AI defense and AI-assisted threat hunting were unlike anything I've done before. Genuinely SOC-ready."
E
Emma S.
SecOps Engineer · E-commerce, Sydney
"We rebuilt our SIEM detection content for AI workloads after this course. Our detection coverage of LLM abuse improved dramatically."
T
Tariq A.
SIEM Specialist · Energy, Riyadh
"The course pace is intense but every minute is applied. My team uses the AI-augmented hunting techniques weekly now."
L
Lin H.
Threat Hunter · Government Agency, Singapore

Bring AI into your Security Operations Centre.

Reserve your seat in the next CAISO cohort, or talk to us about private on-site delivery for your SOC team.