Accelerated AI Skills for Real-World Cyber Risk Analysis & Incident Response

FOUR18 Official Course Syllabus

Program Tracks

2-Week Skills-Intensive Track

Duration: 10 Days | Focus: Core Technical Foundations & IR Workflow Mastery. Covers the full intensive schedule (Days 1–10).

3-Week Professional Track

Duration: 15 Days | Includes: 10-Day Skills-Intensive + 5-Day Capstone Week + assistance in creating a shareable professional portfolio.

1. Course Information

This program prepares cybersecurity professionals to architect and execute AI-driven workflows for risk analysis and incident response. Students operate within a tiered AI Instructional Ecosystem:

  • AI Tutor: Your dedicated AI learning companion guiding you in cyber risk analysis and incident response with real-world synthesis of complex frameworks (NIST, MITRE ATT&CK).
  • AI Assistants: Skills labs level technical co-pilots for rapid skills development.
  • Incident Risk Agent: Structured AI risk analyzer and response planner to resolve real-world incidents into orchestration-ready IR Playbooks and Runbooks.

2. Course Description

This course transforms traditional defensive theory into an experience-driven laboratory. Using Information Stealers (RedLine, Vidar, Raccoon, and Lumma) as a lens, students will investigate the primary fuels of the modern cybercrime economy: stolen identities and session artifacts.

The curriculum introduces the practice of leveraging AI as a co-pilot to translate high-level security concepts into actionable plans. By moving beyond memorization to active synthesis, students master the full Incident Response (IR) lifecycle while employing AI to accelerate triage, evidence linkage, and remediation.

By the end of the course students will have experienced first-hand how to analyze, remediate and mitigate real-world cyber compromises from endpoint incident data and, if completing the follow-on capstone, will pass a practical checkout on artifacts from an actual infostealer incident.

3. Target Audience & Prerequisites

Target Audience

  • New analysts and career changers seeking hands-on real-world experience for job readiness.
  • SOC Analysts and Threat Intelligence Analysts.
  • Digital Forensics and Incident Response (DFIR) Professionals.
  • Cybersecurity Risk Analysts and GRC Specialists.
  • AI Integration Specialists in Security Operations.

Prerequisites

This course builds upon a recognized cyber security foundation such as a college degree or industry recognized certification. Students will typically enter with basic knowledge of:

  • The NIST SP 800-61 IR Lifecycle.
  • Understanding of basic risk assessment (Risk = Likelihood × Impact).
  • Familiarity with Windows/Linux artifacts and common security log formats.

4. Core Learning Objectives

By the end of this intensive, students will be able to:

  • Master the 6-Stage Identity Compromise Risk Model: Execute detailed assessments across Access Level, Device Role, Malware TTPs, Password Analysis, MFA/Session Hijacking, and Third-Party App Risk.
  • Apply AI Power Prompting Frameworks: Utilize the Role, Task, Constraints, and Check model to produce defensible security intelligence.
  • Architect Reproducible Assessment Reports: Develop professional reports utilizing Reproducibility Markers (defining the Model version, specific parameters, and exact prompt snippets used).
  • Develop 5-Stage IR Automation Scripts: Implement the Ingest → Parse → Filter → Summarize → Export pattern to automate triage.
  • Design Safe Remediation Tools: Build "fail-closed" automations featuring Atomic Writes and Dry-Run Logic for credential and token revocation.

5. Ten-Day Intensive Schedule (Weeks 1-2)

Day Learning Objectives Hands-On Lab
01Identity theft mechanics; "Identity Chain Reaction" (Email → GitHub → Slack).Personal Blast Radius Mapping
02Calculating Risk (L×I); Lumma/Vidar evolution.4-Level Risk Heat Map
03Step Scaffolding and Critique Loops (RTCC Framework).Identity-to-URL Mapping
04Strategic Playbooks vs. Tactical Runbooks.Contoso O365 Incident Runbook
05Assessing Access Level, Device Role, and Malware TTPs.Telefonica Artifact Analysis
06MFA Fatigue, Session Hijacking (Token Replay), OAuth persistence.Telefonica Artifact Analysis (cont.)
07Evidence Linkage and "Reproducibility Markers."Drafting Verifiable Reports
08Detection Coverage vs. Detection Fidelity.Applied Detection Matrix
09Implementing the 5-step IR pattern.PowerShell/Python Log Triage
10Automating Remediation Tools through AIApplied endpoint remediation

6. AI-Assisted Security Workflow

Category AI Application Description RTCC Mapping
Code Gen Drafting triage and remediation scripts with robust error handling. Task: Script; Constraints: Atomic, dry-run.
Translation Converting complex logs/TTPs into plain language for executives. Role: Comm Lead; Task: Risk-centric language.
Safety Reviewing AI code for logic errors or destructive loops. Check: Fail-Closed logic evaluation.
Doc Summaries including evidence pathways and at-risk compromised corporate systems assessments. Constraints: Model version and prompt snippet.

7. Capstone Project

3-Week Professional Track Exclusive

The Capstone is an additional high-intensity week designed specifically for the 3-Week Professional Track. It serves as the ultimate synthesis of the skills developed during the 10-day intensive, requiring students to complete and be checked-out on a comprehensive response to an un-sanitized real-world evidence pack.

Extended Investigative Work

Students move beyond guided labs to conduct and document an exhaustive 5-day investigation of a real-world cyber threats with implementable remediations, mitigations and management communications. This phase leverages the 6-Stage Identity Compromise Risk Model and AI Power Prompting to identify persistence markers, lateral movement, and the "Identity Chain Reaction" in unstructured data dumps.

The Professional Digital Portfolio

A central pillar of the Capstone is the curation of a Shareable Professional Portfolio. This digital asset provides tangible proof of job readiness and personal branding utility by showcasing:

  • Architect-Level Analysis: Professional reports featuring direct evidence linkage and Reproducibility Markers.
  • Production-Grade Tooling: Custom remediation scripts (Python/PowerShell) developed during the course, featuring input validation, Atomic Writes, and "Dry-Run" switches.
  • Executive Communication: A 2–3 minute AI-generated video (HeyGen) providing organizational awareness and actionable steps for leadership.
  • Course Milestones: A verified record of hands-on applied AI skills in cyber IR with accomplishments across the 15-day program.

8. Grading & Safety Guardrails

  • Zero Hallucination Tolerance: Fabricated details result in an Automatic Failure.
  • Reproducibility Pillar: All findings must include Model version and prompt snippet.
  • Human-in-the-Loop: Mandatory human safety audit for remediation scripts.
  • Operational Safety: Use of "Fail-Closed" patterns in sandbox environments.

9. Essential Resources

  • Frameworks: NIST SP 800-61; 6-Stage Identity Compromise Risk Model.
  • Guides: Error Handling Guide for IR Scripts; Malware TTP Cheat Sheet.
  • Tools: HeyGen Video Studio; GitHub/Microsoft Graph API docs.