:Search:

Udemy Pentesting GenAI LLM models Securing Large Language Mod

Torrent:
Info Hash: A8A594D902DFA3BC51DC72089AB10948EE9566EA
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 3
Type: Tutorials
Language: English
Category: Other
Size: 1.6 GB
Added: May 1, 2025, 8:23 a.m.
Peers: Seeders: 2, Leechers: 3 (Last updated: 11 months, 2 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 1 2 0
udp://exodus.desync.com:6969/announce 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 1 1 1
udp://tracker.torrent.eu.org:451/announce 1 1 2
udp://explodie.org:6969/announce 1 0 0
udp://tracker.birkenwald.de:6969/announce 0 2 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 0 0 0
udp://tracker.therarbg.to:6969/announce 0 2 0
Files:
  1. Get Bonus Downloads Here.url 183 bytes
  2. 1 -Introduction and Course resource.mp4 23.5 MB
  3. 1 -LLM PENTEST.pptx 10.6 MB
  4. 1 -What is Penetration Testing.mp4 31.5 MB
  5. 2 -Why LLMs Are Vulnerable.mp4 19.1 MB
  6. 1 -Why Benchmarks Are Not Enough AI Safety & Security.mp4 14.4 MB
  7. 10 -Demo LLM Application Overview.mp4 6.8 MB
  8. 11 -Importing the LLM Application.mp4 7.3 MB
  9. 2 -Ai Application vulnerabilities.ipynb 14.0 KB
  10. 2 -LLM Application Vulnerabilities - Demo 01 (Code Explanation).mp4 22.4 MB
  11. 3 -LLM Application Vulnerabilities - Demo 02 (Biased and Stereotypes).mp4 39.2 MB
  12. 4 -LLM Application Vulnerabilities - Demo 03 (Sensitive Data Disclosure).mp4 37.3 MB
  13. 5 -LLM Application Vulnerabilities - Demo 04 (Service Disruption).mp4 12.5 MB
  14. 6 -LLM Application Vulnerabilities - Demo - 05 (Hallucination).mp4 33.8 MB
  15. 7 -Foundation Models vs. LLM Apps.mp4 17.6 MB
  16. 8 -Strategies for LLM Application Safety.mp4 18.0 MB
  17. 9 -Examining LLM Vulnerabilities.mp4 14.3 MB
  18. 1 -Why Penetration Testing is Essential for GenAI.mp4 30.3 MB
  19. 2 -Comparing Red Teaming and Penetration Testing.mp4 27.7 MB
  20. 3 -Penetration Testing Process.mp4 23.2 MB
  21. 4 -Exploitation.mp4 20.1 MB
  22. 5 -Post-Exploitation.mp4 31.5 MB
  23. 1 -Red Teaming LLMs Five Key Techniques.mp4 107.8 MB
  24. 1 -Reporting.mp4 10.4 MB
  25. 2 -Remediation and Reporting.mp4 27.2 MB
  26. 1 -What is ATT&CK.mp4 24.8 MB
  27. 10 -Exploring ATT&CK Groups.mp4 20.1 MB
  28. 11 -Software in the ATT&CK Framework.mp4 15.6 MB
  29. 12 -Campaigns Overview.mp4 22.1 MB
  30. 13 -ATT&CK Relationships.mp4 15.1 MB
  31. 14 -ATT&CK Enterprise Matrix - Hands-On.mp4 200.6 MB
  32. 2 -Understanding the Pyramid of Pain.mp4 56.2 MB
  33. 3 -Overview of ATT&CK Matrices.mp4 11.0 MB
  34. 4 -ATT&CK Tactics.mp4 73.6 MB
  35. 5 -ATT&CK Techniques.mp4 29.7 MB
  36. 6 -ATT&CK Subtechniques.mp4 43.2 MB
  37. 7 -Data Sources for ATT&CK.mp4 15.3 MB
  38. 8 -Detection Strategies.mp4 17.6 MB
  39. 9 -Implementing Mitigation Techniques.mp4 20.3 MB
  40. 1 -Prompt Injection.mp4 18.1 MB
  41. 10 -Plugin Security LLM Applications.mp4 21.1 MB
  42. 11 -Excessive Agency.mp4 27.3 MB
  43. 12 -Overreliance.mp4 35.5 MB
  44. 13 -Model Theft.mp4 16.0 MB
  45. 2 -Indirect Prompt Injection Demo.mp4 122.3 MB
  46. 2 -Indirect Prompt Injection Lab Access.url 101 bytes
  47. 3 -Insecure Output Handling Theory.mp4 26.6 MB
  48. 4 -Insecure Output Handling Demo.mp4 89.5 MB
  49. 4 -Insecure Output Handling Lab Access.url 119 bytes
  50. 5 -Supply Chain Vulnerabilities.mp4 22.7 MB
  51. 6 -Model Denial of Service (DoS).mp4 42.3 MB
  52. 7 -Stop Model DOS Attack.mp4 16.5 MB
  53. 8 -Training Data Poisoning.mp4 26.5 MB
  54. 9 -Sensitive Information Disclosure.mp4 30.1 MB
  55. 1 - About your certificate.html 964 bytes
  56. 1 - Bonus lecture.html 6.3 KB
  57. Bonus Resources.txt 70 bytes

Discussion