

Ikigai AI 5-Day Workshop For Tech Teams (In-Person & Online)
5-Day Intensive In-Person AI & Cybersecurity Workshop in SF Mission (Mon - Fri / 9am - 5pm)
Workshop Overview
An immersive 5-day intensive workshop combining AI fundamentals, security best practices, automation tools, and content creation. This hands-on program takes you from understanding AI basics to building secure AI assistants, mastering automation with n8n, learning penetration testing, and creating AI-powered content with digital avatars. Perfect for tech professionals, tech founders, QA and security practitioners looking to master AI for personal and business use, learn the latest cybersecurity tactics in a comprehensive, practical setting.
Who We Are
We are a team of top AI & cybersecurity experts from the Bay Area with deep experience in automation, security research, and production AI systems. Our instructors come with years of experience bringing real-world expertise from building systems that operate at scale without security incidents.
Target Audience
CxO level
Tech professionals and developers
Startup founders
Security engineers and analysts
DevSecOps professionals
Digital marketers and content creators
QA Engineers
Anyone looking to master PRACTICAL AI tools for business automation
Prerequisites
Level: Intermediate (not suitable for beginners)
Required:
Laptop with at least 16 GB RAM
Comfortable with installing software, using CLI, using git, writing/reading code, having fun and enjoying cookies with tea;
Slight fear that you aren’t caught up;
Willingness to learn and experiment.
What You'll Learn
Over five intensive days, you'll gain hands-on experience with cutting-edge, practical yet, AI technologies, security practices, automation tools, and content creation platforms.
Workshop Schedule (Mon - Fri)
Daily Schedule: 9:00 AM - 5:00 PM (with 2-hour lunch break from 12:00 PM - 2:00 PM).
Day 1: How to deploy a secure personal AI assistant on your computer
Instructor: Pavel Spesivtsev
Serial AI-Founder and CTO @ GapTrap.ai, Fibonacci 7, Cellery.ai. Product Builder who runs production AI agent systems operating autonomously for weeks without human intervention or security incidents. Pavel has developed frameworks for agent governance that balance capability with control. Philosophy: 'Slow down to go fast' - build the harness, quality and security layers first, then add features.
Morning Session (9:00 AM - 12:00 PM): AI Fundamentals
The Second Inflection: 88% of companies adopted AI, only 6% capture real value (McKinsey 2025). What separates the two groups.
Architecture of Intelligence: tokens, embeddings, attention, pre-training, and why Claude, Gemini and ChatGPT feel different
Hands-on: Token economics calculator, embedding space exploration, temperature experiments
Why AI Fails: hallucination, context overflow, prompt injection, sycophancy, and how to prevent each
Architecture Decision Matrix: when to use prompt engineering, RAG, fine-tuning, or agents
Hands-on: Hallucination forensics on your own domain; group architecture design challenge
From Prompt to Agent: system prompts, few-shot learning, chain of thought, tool use, building your first agent
60-second MCP teaser (message host about MCP workshop)
Business Decision Framework: model comparison table (OpenAI, Claude, Gemini, Kimi K2.5, GLM 5, Qwens), MIT/Harvard productivity data, personal AI ROI worksheet
LUNCH Break (12 PM - 2 PM)
Afternoon Session (2:00 PM - 5:00 PM): Secure AI Assistant
The OpenClaw disaster: 150K+ GitHub stars, 4,500+ exposed instances, plaintext credentials, zero authentication
The Lethal Trifecta: why personal AI assistants become security nightmares (private data + network access + untrusted input)
Hands-on: Building the secure foundation in four layers: isolated execution environment, authentication gateway, human-approval confirmation flows, network egress allowlist
Adding high-value capabilities: persistent memory, messenger integration, connecting to real-world data sources (specifics adjusted based on pre-workshop survey)
Testing your defenses: prompt injection, credential exfiltration, unauthorized network egress. Attack your own system. Fix what breaks.
What you take home: working secure AI assistant, security validation checklist, architecture decision matrix, personal AI ROI worksheet
Bridge to Day 2: your assistant becomes a case study for Bogdan's cybersecurity sessions
Evening Activity: Tea Social (Weather permitting - gas firepit in the backyard garden).
Day 2: AI & Cybersecurity I - How to protect your company in the age of AI (Defensive Strategies)
Instructor: Bogdan Red
Founder & CEO @ CQR Company Senior penetration tester and security researcher with 15+ years of hands-on experience. Bogdan has been at the forefront of offensive security since 2008, discovering and responsibly disclosing hundreds of data breaches. He developed CryEye, an enterprise cybersecurity platform, and has provided over 40 different cybersecurity services including red team operations for Fortune 500 companies.
Morning Session (9:00 AM - 12:00 PM): Understanding Data Leaks
History of cybersecurity: evolution of threats and defenses
Types of data leaks and leak vectors
Real-world case studies: Instagram, TikTok, FBI breaches
Cloud platform vulnerabilities (AWS, GCP, Azure)
Dark web marketplaces and data sales
Financial impact of data breaches by industry
LUNCH Break (12 PM - 2 PM)
Afternoon Session (2:00 PM - 5:00 PM): AI-Powered Detection
Using AI for leak detection and monitoring
Hands-on: HaveIBeenPwned API automation
Building AI-powered monitoring scripts
GitHub secret scanning with AI validation
Analyzing leaked database dumps intelligently
Creating comprehensive breach response playbooks
Evening Activity: Qigong Session
Day 3: How to automate manual work with n8n + VAPI + ElevenLabs
Instructor: Kheir Lazaref
Founder & CEO @ Ai Automation Agency - automation expert specializing in n8n workflow orchestration and AI agent development. Kheir builds production-grade automation systems that connect AI models to real business processes, enabling teams to scale without hiring.
Morning Session (9:00 AM - 12:00 PM): N8n Fundamentals
Introduction to n8n workflow automation
Understanding nodes, triggers, and connections
AI agent architecture in n8n
Integrating LLMs (Claude, GPT-4, Gemini)
Tool calling and function execution: (example of Web search integration (Tavily API)
Hands-on setup of a Voice Interface in VAPI
Working with VAPI API for voice agent <> n8n communication for data retrieval
Creating a RAG out of company data: chunking, embedding, database storage, retrieving information
Feeding to a chat interface and / or voice agent.
RAG - Comparison of LLM chains for chatbot with Retrieval Augmented Generation (knowledgebase).
Error handling and workflow optimization
The above workshop will give you hands-on experience of creating a fully functional RAG-powered (trained on your company technical documentation) open source system built within 3 hours on a no-code / low-code AI Workflow Automation Platform (n8n.io) It can further be and API connected services like VAPI and Tavily.
LUNCH Break (12 PM - 2 PM)
Afternoon Session (2:00 PM - 5:00 PM): Building JARVIS Agent
Deploy your personal JARVIS: ElevenLabs + n8n.io
Create a multi-agent workflow that connects Google Calendar, Gmail,
Content Generation Sub-Workflow (scanning for new articles and writing a short post for linkedin out of it)
Tvillio integration
Email automation workflow
Calendar integration and scheduling
In this Workshop you will build upon the Morning session project towards implementing more production ready workflows using n8n, ElevenLabs and Google Suite.
Evening Activity: Vipassana Group Meditation Session
Day 4: AI & Cybersecurity II - How to protect your assets from hacker attacks (Modern Penetration Testing)
Instructor: Bogdan Red
Founder & CEO @ CQR Company Senior penetration tester and security researcher with 15+ years of hands-on experience. Bogdan has been at the forefront of offensive security since 2008, discovering and responsibly disclosing hundreds of data breaches. He developed CryEye, an enterprise cybersecurity platform, and has provided over 40 different cybersecurity services including red team operations for Fortune 500 companies.
Morning Session (9:00 AM - 12:00 PM): Penetration Testing Methodology
8-step penetration testing framework
OSINT and reconnaissance techniques
Network scanning with nmap and advanced tools
Vulnerability assessment and CVE identification
Web application testing with Burp Suite
Social engineering and phishing simulations
LUNCH Break (12 PM - 2 PM)
Afternoon Session (2:00 PM - 5:00 PM): Hands-On Exploitation
Metasploit Framework for exploitation
Post-exploitation and privilege escalation
CryEye platform walkthrough
Writing professional penetration testing reports
AI-enhanced vulnerability validation
Lab: Comprehensive pentest simulation
Evening Activity: Movie Night - 'Guest from the Future'
Day 5: Scale Yourself with a Digital Employee
Instructor: Max Sapo (@Delamax)
Founder & CEO @ Happyverse.ai | A pioneer in Real-Time Interactive AI Agents. Max builds the infrastructure for "Digital Employees"—video agents that can see, hear, and converse with users in real-time (<500ms latency). He specializes in the architecture of autonomous communication: replacing static chatbots with human-like video interfaces for sales, screening, and coaching.
Morning Session (9:00 AM – 12:00 PM)
Building a Real-Time Digital Employee
This session moves beyond content tools. You will design and deploy a real-time AI agent that can represent you, your brand, or your company in live conversations.
1️⃣ Why Real-Time Changes the Game
Why most AI agents feel slow, robotic, and low-trust
The psychology of sub-500ms response times
Why face-to-face AI converts better than text chat
Where real-time agents outperform static chatbots
2️⃣ The Architecture of a Live Agent
The “Brain”: Connecting an LLM (Claude GPT Gemini) to a defined role
The “Voice”: Speech synthesis and tone control
The “Face”: Real-time avatar rendering
The “Memory”: Knowledge bases and context control
The orchestration layer that makes it all work together
Clear breakdown of how LLM ↔ Audio ↔ Video systems interact under real latency constraints.
3️⃣ Designing Your Agent’s Identity
Writing a system prompt that actually governs behavior
Defining scope: what your agent can and cannot do
Creating guardrails to prevent hallucination or overpromising
Matching personality to business objective
4️⃣ Founder Use Cases
The 24/7 Sales Rep: Handling objections live on your landing page
The L&D Coach: Roleplaying onboarding and leadership scenarios
The Investor Screener: Answering FAQs while collecting structured interest
Hands-On Lab
Each participant:
Defines a specific business use case
Writes a production-ready system prompt
Structures a knowledge base
Prepares their first real-time digital employee
Afternoon Session (2:00 PM – 5:00 PM)
Deploying and Operating Your Agent
Now you take your agent from prototype to deployment-ready system.
1️⃣ The Real Tech Stack
How production real-time agents are orchestrated
Managing latency across LLM, speech, and video layers
Tool access: connecting your agent to real actions
Calendar booking
CRM updates
Data retrieval
Structured output workflows
2️⃣ Security & Governance
Aligned with the cybersecurity foundation of the bootcamp:
Permission scoping
Output validation
Preventing hallucinated commitments
Logging and monitoring interactions
When to require human-in-the-loop
3️⃣ From Demo to Business Asset
Embedding your agent on a website
Measuring engagement and conversion
Where real-time agents increase revenue or reduce cost
Common deployment mistakes founders make
Each participant:
Deploys their real-time agent
Conducts a live conversation
Tests objections, edge cases, and guardrails
Receives structured feedback
You leave not with a concept — but with a working, deployable digital employee.
Evening Activity: Fire Pit Talks & Closing Ceremony
-------------- GENERAL INFO ----------
Scholarship Opportunities:
We offer 2 full scholarship spots per workshop. To apply please write an email to [email protected] describing why you qualify.
What's Included
40 hours of expert instruction and hands-on training
Comprehensive workshop materials and documentation
Access to all tools and platforms used during training
Pre-configured lab environments
On demand demo access to CryEye platform
Template libraries and code examples
60-day post-workshop support and Q&A access
Certificate of completion
Lifetime access to private skool.com community
Facilities & Location
Cozy learning space in San Francisco
Evening social activities and networking
Unlimited free hot tea, coffee, and healthy snacks
Garden area for meditation and relaxation
Public Transportation:
BART - 16th Street Station (5-minute walk)
Parking:
Street parking available. University parking on 15th Street towards USF.
REFUND POLICY: Full refund for any reason.