Dive deeper into your knowledge of deepfakes, and see how AI could make you question everything you know.

Course:
AI Deepfakes
Arrow back

Think you can't be fooled by an AI Deepfake? Technology and artificial intelligence are growing increasingly sophisticated - so make sure you and your team stay up to date with the latest developments.

AI Deepfakes

Think you can't be fooled by an AI Deepfake? Technology and artificial intelligence are growing increasingly sophisticated - so make sure you and your team stay up to date with the latest developments.

Included in…
Bob's CultureBob's Compliance
You’ll be able to…
Understand how AI-generated deepfakes work
Recognise deepfake voice and video scam techniques
Understand how deepfakes are used in fraud
Apply safer verification habits when voice or video is involved

Course overview

About the course

AI has made it possible to convincingly fake voices, faces, and live interactions.

Deepfakes blur the line between real and fake — and attackers exploit our natural trust in what we see and hear.
This module explores how deepfake technology is used in scams, how it undermines traditional verification, and what you can do to stay safe.
This is the image caption.

It’s time to get up to speed on AI and get ahead of your competitors by learning all about this revolutionary technology.

This is the image caption.

It’s time to get up to speed on AI and get ahead of your competitors by learning all about this revolutionary technology.

What’s covered

  • The Anatomy of a Deepfake: Understanding the AI and machine learning techniques used to swap faces and clone voices.

  • The Spectrum of Synthetic Media: Distinguishing between “cheapfakes” (basic edits) and sophisticated, high-end deepfakes.

  • High-Risk Scenarios: Identifying how deepfakes are used in business email compromise (BEC), social engineering, and misinformation campaigns.

 

Learning outcomes

What you will learn

By the time you finish this course in Deepfake Awareness, you should have acquired knowledge and skills that you’ll be able to use right away in your work to safeguard your organisation’s data, reputation, and financial assets from synthetic identity fraud.

Identify

This course will help you to understand…
  • Visual Glitches and Artifacts: How to spot unnatural eye movements, skin smoothing, and “blurring” around the edges of a face.

  • Audio Irregularities: Recognizing robotic cadences, strange breathing patterns, or lack of background noise in cloned voice calls.

  • Contextual Red Flags: Assessing the urgency and “weirdness” of a request, even if the source looks and sounds like a trusted executive.

React

This course will give you the ability to…
  • Implement Challenge-Response Protocols: Use specific, non-obvious questions to verify a caller’s identity in real-time.

  • Deploy Verification Workflows: Establish multi-channel authentication before acting on high-stakes requests or financial transfers.

  • Report and Escalate: Follow the correct internal procedures to alert IT and security teams when a synthetic media threat is detected.

Our learning methodology

The Bob’s Business way

Bob’s Business courses are built on the twin principles of behavioural science and psychology to deliver truly exceptional results to organisations of all sizes, across the public and private sectors.

Simple, actionable advice
Simple, actionable advice

We choose to use clear language and simple, actionable advice in our courses to help lock in positive behaviours.

Simple, actionable advice
Simple, actionable advice

We choose to use clear language and simple, actionable advice in our courses to help lock in positive behaviours.

High-quality course design
High-quality course design

Our courses are built in house by our dedicated team and use animations, storytelling and a cast of unique characters for training people actually want to take.

Online learning
Online learning

Every Bob’s Business course is powered by online learning and hosted on an included LMS, which enables users to take our courses at any time, on any device.

Included reinforcement
Included reinforcement

Each course comes with a dedicated Reinforcement Pack, with up-to 18 included materials like screensavers, blog posts, email footers and more to drive home the key messages of each course and help make new behaviours permanent.

Ready to build your cybersecurity culture?

Whether you’re looking for complete culture change, phishing simulations or compliance training, we have solutions that are tailor-made to fit for your organisation.

Girl with laptop
Boy with laptop
man and woman with laptops
ISO27001
ISO9001
Global Cyber Alliance