Build AI-Powered Security Tools | 40 Hands-On Labs for Security Practitioners
Build AI-Powered Security Tools | Hands-On Learning
Not generic ML courses. Every lab solves real security problems: phishing, malware, C2 detection, incident response.
No toy examples. Build classifiers, agents, RAG systems, and detection pipelines you can actually use.
Designed for AI-assisted development with Cursor, Claude Code, and Copilot. Learn the modern way.
Labs 00-13 need no API key. Learn ML foundations before spending on LLM APIs. Ollama option for $0 total.
New to Python? Start at Lab 00. Security-to-AI Glossary translates ML jargon into terms you know.
Every lab has comprehensive tests. Know your code works before deploying. 100% pass rate.
All 51 labs shown in the grid below with full details
Python, VS Code, virtual env, Jupyter
Variables, files, APIs, IOC extraction
LLM basics, templates, free playgrounds
AI coding assistants, Claude Code, Cursor, Copilot
Supervised, unsupervised, features, metrics
Real-world use cases, limitations, workflows
Statistics, Plotly, security dashboards
Your first ML model, scikit-learn basics
HTTP basics, requests, JSON parsing
CTF mindset, encoding, flag hunting techniques
ML text classification, TF-IDF, Random Forest
K-Means, DBSCAN, feature extraction
Isolation Forest, statistical baselines
When to use ML vs LLM, cost comparison
Tool calling, ReAct basics, agent loops
Prompt engineering, IOC extraction
ReAct pattern, LangChain, autonomous investigation
Deep dive into embeddings for RAG
Vector embeddings, ChromaDB, doc Q&A
PE files, headers, sections for YARA
Sigma rule syntax, SIEM queries, LLM generation
AI-assisted rule generation, validation
CVSS scoring, risk-based prioritization
Multi-stage ML + LLM architecture
Observability, drift detection, logging
IR lifecycle, Windows artifacts, ATT&CK
Conversational IR assistant, playbooks
Event log parsing, security event detection
Registry analysis, persistence detection
Live IR, triage procedures, evidence collection
Evolution, families, indicators, recovery
Entropy analysis, behavioral detection
Safe adversary emulation, gap analysis
Volatility3, process injection, credentials
Beaconing, DNS tunneling, JA3
Auth anomalies, attack path graphs
TTP extraction, campaign clustering
Deepfakes, AI phishing, detecting AI attacks
ML threat models, attack taxonomy
Evasion attacks, poisoning, defenses
Prompt injection, jailbreak testing
Drift detection, adversarial input detection
Custom embeddings, LoRA, deployment
KB poisoning, context sanitization
AWS/Azure/GCP fundamentals, IAM, logs
AI-powered CloudTrail analysis
Kubernetes, runtime detection, image scanning
Lambda, event injection, cold start attacks
Automated containment, evidence collection
Prompt injection, jailbreaks, guardrails
AI attack simulation, detection validation
Click to expand each path and see the recommended labs
Start here! Foundations β ML basics β LLM basics. No API key needed until Lab 35.
π Foundations (Optional Prep)
π¬ ML Basics (No API Key)
π€ LLM Basics (API Key Required)
Total: ~25 hours | Cost: Free β ~$5
Build advanced tools. Detection pipelines, IR copilots, and DFIR automation.
Total: ~40 hours | Cost: ~$15-25
Advanced techniques: threat actor profiling, adversarial ML, cloud/container security, and red teaming.
Total: ~37 hours | Cost: ~$15-30
| Labs | API Required | Estimated Cost |
|---|---|---|
| 00-03 (ML Foundations) | No | Free |
| 04-07 (LLM Basics) | Yes | ~$2-8 |
| 08-10 (Advanced) | Yes | ~$5-15 |
| 11-20 (Expert) | Yes | ~$10-25 |
| With Ollama (local) | No | $0 Total |
Run labs directly in your browser β no installation needed!
π All 50+ lab notebooks available for Colab
One-command setup with all services pre-configured:
git clone https://github.com/depalmar/ai_for_the_win.git
cd ai_for_the_win/docker
docker compose up -d
# Access Jupyter Lab at http://localhost:8888 (token: aiforthewin)
π¦ Includes: Jupyter, Elasticsearch, Kibana, PostgreSQL, Redis, MinIO, Ollama, ChromaDB
git clone https://github.com/depalmar/ai_for_the_win.git
cd ai_for_the_win
python -m venv venv
source venv/bin/activate # Win: venv\Scripts\activate
pip install -r requirements.txt
python labs/lab10-phishing-classifier/solution/main.py
ML terms explained using security analogies
Curated paths for 9 security roles
Setup and cost management
Fix common issues and errors
Step-by-step solutions for each lab
Local notebook setup guide
Zero-setup browser notebooks
Tools, APIs, dev setup, and more
Dual License (MIT + CC BY-NC-SA 4.0) | Built for security practitioners | Created by Raymond DePalma
Disclaimer: This is a personal educational project created on personal time. It is not affiliated with, endorsed by, or sponsored by any employer or vendor. All tool references are for educational purposes only.