:Search:

Defending and Deploying AI

Torrent:
Info Hash: 67A281A7336A5BB8CA143A74E7024AA795C6F4FE
Similar Posts:
Name Uploaded Size Se Le Upl. by
2025-09-25 3.4 GB 2 6 freecoursewb
Uploader: freecoursewb
Source: 1 Logo 1337x
Type: Tutorials
Language: English
Category: Other
Size: 3.4 GB
Added: Sept. 25, 2025, 6:32 p.m.
Peers: Seeders: 2, Leechers: 6 (Last updated: 6 months, 3 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 0 0
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 1 2 0
udp://tracker.torrent.eu.org:451/announce 0 0 0
udp://explodie.org:6969/announce 1 3 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.therarbg.to:6969/announce 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 001. Introduction.en.srt 2.9 KB
  3. 001. Introduction.mp4 15.7 MB
  4. 001. Summary.en.srt 2.9 KB
  5. 001. Summary.mp4 16.7 MB
  6. 001. Introduction.en.srt 4.3 KB
  7. 001. Introduction.mp4 20.5 MB
  8. 001. Summary.en.srt 3.9 KB
  9. 001. Summary.mp4 17.3 MB
  10. Bonus Resources.txt 70 bytes
  11. 001. Introduction.en.srt 2.4 KB
  12. 001. Introduction.mp4 12.3 MB
  13. 001. Summary.en.srt 1.3 KB
  14. 001. Summary.mp4 7.2 MB
  15. 001. Learning objectives.en.srt 1.6 KB
  16. 001. Learning objectives.mp4 9.4 MB
  17. 002. 1.1 Overview of AI Labs and Sandboxes - Home-based vs. Cloud-based.en.srt 8.9 KB
  18. 002. 1.1 Overview of AI Labs and Sandboxes - Home-based vs. Cloud-based.mp4 20.1 MB
  19. 003. 1.2 Choosing the Right Hardware (GPUs, CPUs, Memory, etc.).en.srt 11.5 KB
  20. 003. 1.2 Choosing the Right Hardware (GPUs, CPUs, Memory, etc.).mp4 50.3 MB
  21. 004. 1.3 Building or Buying Pre-built Systems.en.srt 5.3 KB
  22. 004. 1.3 Building or Buying Pre-built Systems.mp4 15.2 MB
  23. 005. 1.4 Choosing the Operating Systems (Linux, Windows, macOS).en.srt 5.0 KB
  24. 005. 1.4 Choosing the Operating Systems (Linux, Windows, macOS).mp4 16.6 MB
  25. 006. 1.5 Surveying Essential Software (Python, Anaconda, Jupyter Notebooks, and Other Frameworks).en.srt 5.6 KB
  26. 006. 1.5 Surveying Essential Software (Python, Anaconda, Jupyter Notebooks, and Other Frameworks).mp4 18.8 MB
  27. 007. 1.6 Introducing Hugging Face.en.srt 4.3 KB
  28. 007. 1.6 Introducing Hugging Face.mp4 13.8 MB
  29. 008. 1.7 Introducing Ollama.en.srt 3.6 KB
  30. 008. 1.7 Introducing Ollama.mp4 12.3 MB
  31. 009. 1.8 Installing Ollama.en.srt 6.5 KB
  32. 009. 1.8 Installing Ollama.mp4 16.6 MB
  33. 010. 1.9 Ollama Integrations.en.srt 17.6 KB
  34. 010. 1.9 Ollama Integrations.mp4 47.0 MB
  35. 011. 1.10 Exploring the Ollama REST API.en.srt 3.4 KB
  36. 011. 1.10 Exploring the Ollama REST API.mp4 12.7 MB
  37. 012. 1.11 Introducing Retrieval Augmented Generation (RAG).en.srt 6.5 KB
  38. 012. 1.11 Introducing Retrieval Augmented Generation (RAG).mp4 13.9 MB
  39. 013. 1.12 Leveraging RAGFlow.en.srt 16.9 KB
  40. 013. 1.12 Leveraging RAGFlow.mp4 40.7 MB
  41. 001. Learning objectives.en.srt 1.6 KB
  42. 001. Learning objectives.mp4 8.6 MB
  43. 002. 1.1 Understanding the Significance of LLMs in the AI Landscape.en.srt 10.4 KB
  44. 002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 48.8 MB
  45. 003. 1.2 Exploring the Resources for this Course - GitHub Repositories and Others.en.srt 4.6 KB
  46. 003. 1.2 Exploring the Resources for this Course - GitHub Repositories and Others.mp4 11.0 MB
  47. 004. 1.3 Introducing Retrieval Augmented Generation (RAG).en.srt 18.4 KB
  48. 004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 34.0 MB
  49. 005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.en.srt 8.7 KB
  50. 005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 20.9 MB
  51. 006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.en.srt 8.4 KB
  52. 006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 26.4 MB
  53. 007. 1.6 Understanding the NIST Taxonomy and Terminology of Attacks and Mitigations.en.srt 10.8 KB
  54. 007. 1.6 Understanding the NIST Taxonomy and Terminology of Attacks and Mitigations.mp4 21.6 MB
  55. 001. Learning objectives.en.srt 3.8 KB
  56. 001. Learning objectives.mp4 18.8 MB
  57. 002. 1.1 Overview of the Evolution of AI-driven Tools.en.srt 6.2 KB
  58. 002. 1.1 Overview of the Evolution of AI-driven Tools.mp4 17.6 MB
  59. 003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).en.srt 12.2 KB
  60. 003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).mp4 30.0 MB
  61. 004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.en.srt 8.4 KB
  62. 004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.mp4 27.2 MB
  63. 005. 1.4 An Overview of Open-source AI Models and Hugging Face.en.srt 4.4 KB
  64. 005. 1.4 An Overview of Open-source AI Models and Hugging Face.mp4 17.0 MB
  65. 006. 1.5 Introducing Retrieval Augmented Generation (RAG).en.srt 16.2 KB
  66. 006. 1.5 Introducing Retrieval Augmented Generation (RAG).mp4 37.7 MB
  67. 007. 1.6 Introducing Embedding Models.en.srt 8.2 KB
  68. 007. 1.6 Introducing Embedding Models.mp4 39.5 MB
  69. 008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.en.srt 5.4 KB
  70. 008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.mp4 17.7 MB
  71. 009. 1.8 Introducing Semantic Search.en.srt 6.3 KB
  72. 009. 1.8 Introducing Semantic Search.mp4 24.5 MB
  73. 001. Learning objectives.en.srt 1.5 KB
  74. 001. Learning objectives.mp4 9.1 MB
  75. 002. 1.1 Introduction to Retrieval Augmented Generation (RAG).en.srt 8.5 KB
  76. 002. 1.1 Introduction to Retrieval Augmented Generation (RAG).mp4 23.0 MB
  77. 003. 1.2 Exploring the GitHub Repositories and Additional Resources.en.srt 4.0 KB
  78. 003. 1.2 Exploring the GitHub Repositories and Additional Resources.mp4 12.6 MB
  79. 004. 1.3 Embeddings and Embedding Models.en.srt 21.1 KB
  80. 004. 1.3 Embeddings and Embedding Models.mp4 81.4 MB
  81. 005. 1.4 Indexing Techniques.en.srt 14.8 KB
  82. 005. 1.4 Indexing Techniques.mp4 34.3 MB
  83. 006. 1.5 Vector Databases.en.srt 7.4 KB
  84. 006. 1.5 Vector Databases.mp4 19.4 MB
  85. 007. 1.6 Chunking Strategies.en.srt 11.4 KB
  86. 007. 1.6 Chunking Strategies.mp4 35.5 MB
  87. 008. 1.7 RAG vs. Fine-tuning.en.srt 16.3 KB
  88. 008. 1.7 RAG vs. Fine-tuning.mp4 48.9 MB
  89. 009. 1.8 RAG, RAG Fusion, and RAPTOR.en.srt 13.4 KB
  90. 009. 1.8 RAG, RAG Fusion, and RAPTOR.mp4 29.1 MB
  91. 010. 1.9 Running Open Weight Models with Ollama.en.srt 18.9 KB
  92. 010. 1.9 Running Open Weight Models with Ollama.mp4 62.8 MB
  93. 011. 1.10 Exploring Open WebUI and Other Ollama Plugins.en.srt 13.9 KB
  94. 011. 1.10 Exploring Open WebUI and Other Ollama Plugins.mp4 49.8 MB
  95. 012. 1.11 Introduction to AI Agents and Agentic Implementations.en.srt 7.4 KB
  96. 012. 1.11 Introduction to AI Agents and Agentic Implementations.mp4 18.4 MB
  97. 013. 1.12 Introduction to Agentic RAG.en.srt 6.8 KB
  98. 013. 1.12 Introduction to Agentic RAG.mp4 17.9 MB
  99. 014. 1.13 Introducing the Model Context Protocol (MCP).en.srt 16.5 KB
  100. 014. 1.13 Introducing the Model Context Protocol (MCP).mp4 49.0 MB
  101. 015. 1.14 Introducing A2A and AGNTCY.en.srt 22.7 KB
  102. 015. 1.14 Introducing A2A and AGNTCY.mp4 67.0 MB
  103. 001. Learning objectives.en.srt 542 bytes
  104. 001. Learning objectives.mp4 3.8 MB
  105. 002. 2.1 Advantages and Disadvantages of Cloud AI Labs and Sandboxes.en.srt 10.3 KB
  106. 002. 2.1 Advantages and Disadvantages of Cloud AI Labs and Sandboxes.mp4 19.1 MB
  107. 003. 2.2 Introducing Amazon Bedrock.en.srt 8.6 KB
  108. 003. 2.2 Introducing Amazon Bedrock.mp4 21.0 MB
  109. 004. 2.3 Surveying Amazon SageMaker.en.srt 15.3 KB
  110. 004. 2.3 Surveying Amazon SageMaker.mp4 36.3 MB
  111. 005. 2.4 Exploring Google Vertex AI.en.srt 16.8 KB
  112. 005. 2.4 Exploring Google Vertex AI.mp4 43.4 MB
  113. 006. 2.5 Using Microsoft Azure AI Foundry.en.srt 11.5 KB
  114. 006. 2.5 Using Microsoft Azure AI Foundry.mp4 36.3 MB
  115. 007. 2.6 Discussing Cost Management and Security.en.srt 8.2 KB
  116. 007. 2.6 Discussing Cost Management and Security.mp4 21.5 MB
  117. 008. 2.7 Using Terraform to Deploy Ollama in the Cloud.en.srt 4.2 KB
  118. 008. 2.7 Using Terraform to Deploy Ollama in the Cloud.mp4 10.4 MB
  119. 001. Learning objectives.en.srt 1.1 KB
  120. 001. Learning objectives.mp4 6.7 MB
  121. 002. 2.1 Introducing LangChain.en.srt 5.9 KB
  122. 002. 2.1 Introducing LangChain.mp4 18.1 MB
  123. 003. 2.2 LangChain vs. LlamaIndex.en.srt 5.4 KB
  124. 003. 2.2 LangChain vs. LlamaIndex.mp4 21.0 MB
  125. 004. 2.3 Prompt templates and system prompts.en.srt 17.8 KB
  126. 004. 2.3 Prompt templates and system prompts.mp4 74.2 MB
  127. 005. 2.4 Introducing LangSmith.en.srt 8.0 KB
  128. 005. 2.4 Introducing LangSmith.mp4 24.7 MB
  129. 001. Learning objectives.en.srt 1.3 KB
  130. 001. Learning objectives.mp4 6.6 MB
  131. 002. 2.1 Defining Prompt Injection Attacks.en.srt 17.4 KB
  132. 002. 2.1 Defining Prompt Injection Attacks.mp4 66.1 MB
  133. 003. 2.2 Exploring Real-life Prompt Injection Attacks.en.srt 5.6 KB
  134. 003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 17.2 MB
  135. 004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.en.srt 15.2 KB
  136. 004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 38.2 MB
  137. 005. 2.4 Enforcing Privilege Control on LLM Access to Backend Systems.en.srt 8.4 KB
  138. 005. 2.4 Enforcing Privilege Control on LLM Access to Backend Systems.mp4 15.9 MB
  139. 006. 2.5 Best Practices Around API Tokens for Plugins, Data Access, and Function-level Permissions.en.srt 4.1 KB
  140. 006. 2.5 Best Practices Around API Tokens for Plugins, Data Access, and Function-level Permissions.mp4 10.2 MB
  141. 007. 2.6 Understanding Insecure Output Handling Attacks.en.srt 4.8 KB
  142. 007. 2.6 Understanding Insecure Output Handling Attacks.mp4 8.4 MB
  143. 008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.en.srt 6.8 KB
  144. 008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 20.0 MB
  145. 001. Learning objectives.en.srt 2.0 KB
  146. 001. Learning objectives.mp4 9.6 MB
  147. 002. 2.1 Accelerating Network Security Tasks with AI.en.srt 7.4 KB
  148. 002. 2.1 Accelerating Network Security Tasks with AI.mp4 16.1 MB
  149. 003. 2.2 Prompt Engineering for Cybersecurity.en.srt 3.8 KB
  150. 003. 2.2 Prompt Engineering for Cybersecurity.mp4 11.3 MB
  151. 004. 2.3 Securing AI Implementations.en.srt 20.7 KB
  152. 004. 2.3 Securing AI Implementations.mp4 63.1 MB
  153. 005. 2.4 Exploring Network Security Processes Incorporating AI Tools.en.srt 11.7 KB
  154. 005. 2.4 Exploring Network Security Processes Incorporating AI Tools.mp4 31.9 MB
  155. 001. Learning objectives.en.srt 718 bytes
  156. 001. Learning objectives.mp4 4.5 MB
  157. 002. 3.1 Using Hybrid AI Labs - Combining Home and Cloud Resources.en.srt 2.5 KB
  158. 002. 3.1 Using Hybrid AI Labs - Combining Home and Cloud Resources.mp4 5.9 MB
  159. 003. 3.2 Synchronizing Data and Projects.en.srt 5.2 KB
  160. 003. 3.2 Synchronizing Data and Projects.mp4 11.2 MB
  161. 004. 3.3 Leveraging the Strengths of Both Environments.en.srt 6.8 KB
  162. 004. 3.3 Leveraging the Strengths of Both Environments.mp4 19.5 MB
  163. 005. 3.4 Running Open-Source Models Available on Hugging Face.en.srt 5.4 KB
  164. 005. 3.4 Running Open-Source Models Available on Hugging Face.mp4 14.2 MB
  165. 006. 3.5 Introducing LangChain.en.srt 3.8 KB
  166. 006. 3.5 Introducing LangChain.mp4 9.2 MB
  167. 007. 3.6 Introducing LlamaIndex.en.srt 2.6 KB
  168. 007. 3.6 Introducing LlamaIndex.mp4 7.5 MB
  169. 008. 3.7 Understanding Embedding Models.en.srt 7.5 KB
  170. 008. 3.7 Understanding Embedding Models.mp4 32.0 MB
  171. 009. 3.8 Using Vector Databases.en.srt 6.1 KB
  172. 009. 3.8 Using Vector Databases.mp4 17.4 MB
  173. 001. Learning objectives.en.srt 1.2 KB
  174. 001. Learning objectives.mp4 6.7 MB
  175. 002. 3.1 Mastering Prompt Engineering.en.srt 4.9 KB
  176. 002. 3.1 Mastering Prompt Engineering.mp4 16.1 MB
  177. 003. 3.2 Exploring Basic Prompt Chain Examples.en.srt 12.0 KB
  178. 003. 3.2 Exploring Basic Prompt Chain Examples.mp4 47.2 MB
  179. 004. 3.3 Creating Prompt Branching Chains.en.srt 14.7 KB
  180. 004. 3.3 Creating Prompt Branching Chains.mp4 56.8 MB
  181. 005. 3.4 Exploring Parallel PromptChains.en.srt 9.1 KB
  182. 005. 3.4 Exploring Parallel PromptChains.mp4 42.2 MB
  183. 006. 3.5 Creating a Basic RAG Application.en.srt 17.6 KB
  184. 006. 3.5 Creating a Basic RAG Application.mp4 69.8 MB
  185. 007. 3.6 Creating a Complete RAG Application.en.srt 4.8 KB
  186. 007. 3.6 Creating a Complete RAG Application.mp4 17.7 MB
  187. 001. Learning objectives.en.srt 951 bytes
  188. 001. Learning objectives.mp4 4.9 MB
  189. 002. 3.1 Understanding Training Data Poisoning Attacks.en.srt 6.7 KB
  190. 002. 3.1 Understanding Training Data Poisoning Attacks.mp4 21.8 MB
  191. 003. 3.2 Exploring Model Denial of Service Attacks.en.srt 4.3 KB
  192. 003. 3.2 Exploring Model Denial of Service Attacks.mp4 9.9 MB
  193. 004. 3.3 Understanding the Risks of the AI and ML Supply Chain.en.srt 13.5 KB
  194. 004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 36.3 MB
  195. 005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.en.srt 18.8 KB
  196. 005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 52.4 MB
  197. 006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environme.mp4 67.9 MB
  198. 006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environme.srt 22.7 KB
  199. 001. Learning objectives.en.srt 2.9 KB
  200. 001. Learning objectives.mp4 14.4 MB
  201. 002. 3.1 Exploring How AI is Revolutionizing Software Development.en.srt 3.2 KB
  202. 002. 3.1 Exploring How AI is Revolutionizing Software Development.mp4 11.7 MB
  203. 003. 3.2 Surveying GitHub Copilot, Cursor, and Cody.en.srt 3.1 KB
  204. 003. 3.2 Surveying GitHub Copilot, Cursor, and Cody.mp4 7.6 MB
  205. 004. 3.3 Exploring the CODEX Model.en.srt 1.7 KB
  206. 004. 3.3 Exploring the CODEX Model.mp4 3.6 MB
  207. 005. 3.4 Generating Code from a Prompt.en.srt 7.7 KB
  208. 005. 3.4 Generating Code from a Prompt.mp4 21.0 MB
  209. 006. 3.5 Explaining Existing Code.en.srt 4.1 KB
  210. 006. 3.5 Explaining Existing Code.mp4 13.0 MB
  211. 007. 3.6 Generating Comments.en.srt 5.5 KB
  212. 007. 3.6 Generating Comments.mp4 14.5 MB
  213. 008. 3.7 Prompt Engineering for Software Development.en.srt 12.4 KB
  214. 008. 3.7 Prompt Engineering for Software Development.mp4 29.6 MB
  215. 001. Learning objectives.en.srt 1.1 KB
  216. 001. Learning objectives.mp4 6.2 MB
  217. 002. 4.1 Introduction to AI Agent Frameworks.en.srt 7.0 KB
  218. 002. 4.1 Introduction to AI Agent Frameworks.mp4 19.1 MB
  219. 003. 4.2 Surveying CrewAI.en.srt 9.8 KB
  220. 003. 4.2 Surveying CrewAI.mp4 24.5 MB
  221. 004. 4.3 Introducing LangGraph.en.srt 2.7 KB
  222. 004. 4.3 Introducing LangGraph.mp4 10.1 MB
  223. 005. 4.4 Exploring Examples of LangGraph in Action.en.srt 18.9 KB
  224. 005. 4.4 Exploring Examples of LangGraph in Action.mp4 86.6 MB
  225. 006. 4.5 Exploring an Example of Agents with MCP Servers.en.srt 15.3 KB
  226. 006. 4.5 Exploring an Example of Agents with MCP Servers.mp4 59.3 MB
  227. 007. 4.6 Securing Agentic Implementations.en.srt 13.5 KB
  228. 007. 4.6 Securing Agentic Implementations.mp4 37.3 MB
  229. 001. Learning objectives.en.srt 612 bytes
  230. 001. Learning objectives.mp4 3.7 MB
  231. 002. 4.1 Leveraging LangSmith and LangGraph.en.srt 5.8 KB
  232. 002. 4.1 Leveraging LangSmith and LangGraph.mp4 14.7 MB
  233. 003. 4.2 Using Fine Tuning Frameworks.en.srt 6.2 KB
  234. 003. 4.2 Using Fine Tuning Frameworks.mp4 17.1 MB
  235. 004. 4.3 High-Performance Computing and Edge AI.en.srt 4.7 KB
  236. 004. 4.3 High-Performance Computing and Edge AI.mp4 11.8 MB
  237. 001. Learning objectives.en.srt 1.3 KB
  238. 001. Learning objectives.mp4 6.5 MB
  239. 002. 4.1 Understanding Sensitive Information Disclosure.en.srt 4.2 KB
  240. 002. 4.1 Understanding Sensitive Information Disclosure.mp4 18.1 MB
  241. 003. 4.2 Exploiting Insecure Plugin Design.en.srt 4.3 KB
  242. 003. 4.2 Exploiting Insecure Plugin Design.mp4 12.1 MB
  243. 004. 4.3 Avoiding Excessive Agency.en.srt 5.2 KB
  244. 004. 4.3 Avoiding Excessive Agency.mp4 14.9 MB
  245. 001. Learning objectives.en.srt 1.4 KB
  246. 001. Learning objectives.mp4 6.7 MB
  247. 002. 4.1 Exploring how AI is Revolutionizing Networking.en.srt 11.9 KB
  248. 002. 4.1 Exploring how AI is Revolutionizing Networking.mp4 25.7 MB
  249. 003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.en.srt 9.2 KB
  250. 003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.mp4 22.7 MB
  251. 004. 4.3 Exploring AI Models for Networking Use Cases.en.srt 3.0 KB
  252. 004. 4.3 Exploring AI Models for Networking Use Cases.mp4 7.5 MB
  253. 005. 4.4 Prompt Engineering for Networking.en.srt 9.1 KB
  254. 005. 4.4 Prompt Engineering for Networking.mp4 22.6 MB
  255. 001. Learning objectives.en.srt 1.4 KB
  256. 001. Learning objectives.mp4 7.0 MB
  257. 002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.en.srt 8.1 KB
  258. 002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.mp4 16.2 MB
  259. 003. 5.2 Regulatory and Policy Frameworks.en.srt 7.8 KB
  260. 003. 5.2 Regulatory and Policy Frameworks.mp4 21.9 MB
  261. 004. 5.3 Staying Updated on Advancements in AI and Cybersecurity.en.srt 5.5 KB
  262. 004. 5.3 Staying Updated on Advancements in AI and Cybersecurity.mp4 13.9 MB
  263. 001. Learning objectives.en.srt 885 bytes
  264. 001. Learning objectives.mp4 4.5 MB
  265. 002. 5.1 Understanding Overreliance.en.srt 7.3 KB
  266. 002. 5.1 Understanding Overreliance.mp4 21.2 MB
  267. 003. 5.2 Exploring Model Theft Attacks.en.srt 7.0 KB
  268. 003. 5.2 Exploring Model Theft Attacks.mp4 16.5 MB
  269. 004. 5.3 Understanding Red Teaming of AI Models.en.srt 19.2 KB
  270. 004. 5.3 Understanding Red Teaming of AI Models.mp4 49.1 MB
  271. 001. Learning objectives.en.srt 1.4 KB
  272. 001. Learning objectives.mp4 6.8 MB
  273. 002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.en.srt 25.1 KB
  274. 002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 60.2 MB
  275. 003. 6.2 Securing Embedding Models.en.srt 14.0 KB
  276. 003. 6.2 Securing Embedding Models.mp4 29.3 MB
  277. 004. 6.3 Securing Vector Databases.en.srt 17.7 KB
  278. 004. 6.3 Securing Vector Databases.mp4 41.7 MB
  279. 005. 6.4 Monitoring and Incident Response.en.srt 11.1 KB
  280. 005. 6.4 Monitoring and Incident Response.mp4 23.4 MB
  281. 001. Introduction.en.srt 4.0 KB
  282. 001. Introduction.mp4 18.8 MB
  283. 001. Summary.en.srt 2.2 KB
  284. 001. Summary.mp4 10.6 MB

Discussion