中正大學課程大綱
課程名稱(中文): 大型語言模型與資訊安全系統 開課單位: 工學院碩博班(College of Engineering (Graduate))
課程名稱(英文) Applying Large Language Models in Cybersecurity Systems 課程代碼 4015202_01
授課教師: 學分數 3
必/選修 選修 開課年級 研究所
先修科目或先備能力:
● 台科大上課時間:週一 9:20–12:20,第一個小時為線上課程自修;10:20–12:20 為直播演練時間。
● 聯盟學校學生可非同步上課,先自行完成一小時線上自修,其餘兩小時則於助教固定時段(週一至週五擇一時段,未來將補充公布)參與線上練習,此練習為必修環節,所有學生皆須參與。
是否也接受非同步授課:是
課程概述:
主導老師:臺灣科技大學 林俊叡
本課程探討大型語言模型(LLMs)如何重塑資安領域。學生將學習如何運用 AI 於安全任務、資料整理、機器學習與防禦系統開發。透過專題式學習,團隊將設計並測試真實的 AI+資安解決方案,同時思考倫理、治理,以及「保護 AI」與「運用 AI 防禦」的雙重挑戰。
Applying Large Language Models in Cybersecurity Systems introduces students to the rapidlyevolving intersection of artificial intelligence and cyber defense. The course explores how large language models (LLMs) are transforming cybersecurity practice, from automated threat detection to intelligent defense solutions, while also addressing the unique security challenges AI itself introduces.Students will begin by examining the question “Can AI defend with us?”—a guiding theme that
frames the role of AI as both an ally and a potential risk in digital security. The course then surveys the evolution of AI with a cybersecurity focus, real-world case studies, and the key terminology that shapes the field.Practical skills are emphasized through modules on effective prompting, data curation for threat intelligence, and applying machine learning techniques to security problems. Students will gain hands-on experience in designing, developing, and evaluating AI-powered cyber defense systems, while also considering governance, ethics, and security implications. A distinctive feature of the course is its Project-Based Learning (PBL) track, where students work in teams to translate theoretical knowledge into practical solutions. Through progressive
milestones—requirements, design, proof-of-concept, and final solution—students will learn how to build and evaluate AI-driven security applications that can operate in real-world environments.
By the end of the course, students will be equipped not only with technical competencies in AI and cybersecurity integration but also with the critical perspective required to navigate ethical, organizational, and security governance challenges.

● Weekly assignments are graded on a scale of 1–5 points (0 if not submitted).
● The total score is calculated as 20 base points + the sum of all assignment points, with a maximum of 100 points.

1.本門課程為TAICA臺灣大專院校人工智慧學程聯盟課程,採用台灣大學NTU COOL數位學習平臺進行上課。
2.上課時間:每週一09:20-12:20,9:20–12:20,第一個小時為線上課程自修,10:20–12:20 為直播演練時間。線上收播上課連結:https://taicatw.net/spring-114/。
3.本課程為配合「TAICA 臺灣大專院校人工智慧學程聯盟」之學分學程設立,如果同學滿足學程修課要求,可申請TAICA學分學程證書。
4.學士班同學可以上修。
學習目標:
1.
教科書:
Think Artificial Intelligence: A Student's Guide to AI's Building Blocks, Jerry Cuomo ISBN : 9798350960075
Practical AI for Cybersecurity, by Ravi Das
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative AI Recipes to Supercharge Your Cybersecurity Skills, by Clint Bodungen

課程大綱 分配時數 核心能力 備註
單元主題 內容綱要 講授 示範 隨堂作業 其他
Can AI cyber defend with us?
This opening theme sets the stage by asking whether AI can act as a partner in defending cyberspace.
We will examine how AI shifts from a passive tool to an active collaborator.
AI Evolution, a cybersecurity focus
We trace the evolution of AI, with emphasis on how each wave—from expert systems to
LLMs—intersects with security.
True AI+ Cybersecurity Stories
Real-world case studies illustrate how AI has already been used in cyber defense and offense.
We will examine success stories, failures, and lessons learned.
AI & Cybersecurity Lingo
This module builds a shared vocabulary at the
intersection of AI and security. Students learn
terms used in both communities to prevent
miscommunication.
Prompting AI for Cybersecurity
Students learn how to craft effective prompts for
LLMs in security tasks. We discuss prompt
design, adversarial prompting, and failure cases.
台科大校慶放假一日,當週仍有進度。
Data Curation for Cybersecurity
We explore how security data must be cleaned,
structured, and curated for effective AI use.
Students will learn challenges of logs, alerts,
and threat intelligence feeds.
Machine Learning for Cybersecurity
This module covers classical and modern
machine learning applied to intrusion detection,
anomaly detection, and malware classification.
Students will see how supervised, unsupervised,
and reinforcement learning differ in security
contexts.
清明連假放假一次,當週仍有進度。
Developing AI-powered Cyber Defense
We transition from theory to system building.
Students design end-to-end workflows for
AI-driven defense, including data pipelines,
model integration, and automation layers.
Governing Ethics and Security
AI in security raises governance and ethical
concerns. Students study bias, accountability,
explainability, and dual-use risks. We also cover
standards, regulations, and compliance
frameworks.
True AI+ Cybersecurity Stories
A second set of case studies builds on earlier
discussions, with deeper analysis of emerging
trends. We examine ongoing incidents where AI
is suspected to play a role.
AI for Cybersecurity
We focus on how AI enhances security
functions such as monitoring, detection, and
response. Students review tools and frameworks
that integrate AI in SOC workflows.
Cybersecurity for AI
Here the perspective flips: securing AI systems
themselves. Students examine threats to models,
data pipelines, and APIs. Topics include
adversarial attacks, data poisoning, and model
theft.
PBL: AI+ Security Requirements
Teams begin project-based learning by gathering
requirements for an AI+security solution. The
focus is on defining scope, use cases, and
constraints.
PBL: AI+ Security Design
Teams progress to high-level and detailed design. Students create system architectures,data flows, and defense logic. Emphasis is on aligning design with requirements while considering risks.
PBL: AI+ Security POC
Teams implement a proof-of-concept based on
their designs. The emphasis is on demonstrating
feasibility, not completeness. Students test core
functions and identify limitations.
PBL: AI+ Security Solution
The course culminates with a full solution built
from requirements, design, and POC iterations.
Students deliver a working system or detailed
prototype.


請尊重智慧財產權,不得非法影印教師指定之教科書籍

教學要點概述:
1. 教材編選(可複選):自編簡報(ppt)教科書作者提供
2. 教學方法(可複選):講述板書講述
3. 評量工具(可複選):上課點名 0%, 隨堂測驗0%, 隨堂作業80.00%, 程式實作0%, 實習報告0%,
                       專案報告0%, 期中考0%, 期末考0%, 期末報告0%, 其他20.00%,
4. 教學資源:課程網站 教材電子檔供下載 實習網站
5. 教學相關配合事項: 實體評量時間:沒有考試,但是週週有作業,週週給作業評分

課程目標與教育核心能力相關性        
請勾選: