Module 1: AI in Security Operations: The Landscape
Before you write a single prompt, generate a single query, or deploy a single automation, you need to understand what AI actually does for security teams — and where it fails. The vendor landscape is saturated with “AI-powered” marketing. Most of it is pattern matching with a marketing wrapper. The genuine capabilities — the ones that fundamentally change how a security team operates — are transformative when understood and deployed correctly. They are also dangerous when deployed without understanding their limitations.
This module separates capability from marketing. You will examine what large language models can and cannot do at a fundamental level, map those capabilities to specific security operations functions, review what the major standards bodies say about AI in security (SANS, NIST, OWASP, MITRE), build an evaluation framework for selecting AI tools, establish data handling and privacy requirements, and configure your AI operations foundation.
What you will produce
By the end of this module, you will have:
- An AI capabilities matrix mapping AI strengths and limitations to your security operations functions
- A vendor evaluation framework you can apply to any AI tool your team considers adopting
- A data classification matrix defining what data can be processed by which AI tools on which plans
- A configured AI workspace (Project with system prompt, reference documents, and naming conventions) ready for the operational modules that follow
- A reading list of the primary AI security literature with operational relevance notes
Prerequisites
Complete the Claude Essentials (Foundation + Security tracks) or have equivalent AI tool experience. Working knowledge of security operations — this module does not teach security fundamentals. If you can write a structured prompt and understand why you should never trust AI self-verification, you are ready.
Module structure
- 1.1 What AI Actually Does (and Does Not Do)
- 1.2 The AI Capabilities Matrix for Security Operations
- 1.3 The AI Security Literature — What the Standards Bodies Say
- 1.4 Evaluating AI Tools for Security Operations
- 1.5 Data Handling, Privacy, and Operational Security
- 1.6 Building Your AI Operations Foundation
- Summary Module recap, artifact inventory, and Check My Knowledge