How to use AI and LLMs for Offensive and Defensive Security

martinstronis654

U P L O A D E R
7c779da9dca4a39f2e68370a912d1797.jpg

How to use AI and LLMs for Offensive and Defensive Security
Published 11/2024
Created by Martin Voelk
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 23 Lectures ( 3h 46m ) | Size: 2.45 GB​

Learn how to leverage AI/LLMs for your day-to-day job in both offensive and defensive security. Be ahead of the curve!

What you'll learn
Models / UIs and local setup
Most common LLM Models
Privacy
RAG (Retrieval Augmented Generation)
Front Ends (Open WebUI, jan ai, lmstudio etc.)
Ollama
Huggingface
Prompting and Prompt Engineering
Zero-shot, few-shot, Chain of Thought
System Prompts
Make your own bots
Prompt leakage
Jailbreaking
Troubleshooting
API usage
Yolo tool
Fabric tool
LLM CLI
Using AI/LLM for Offensive Security
Using AI/LLM for Defensive Security

Requirements
Basic IT Skills
Basic understanding of web technology
No programming or hacking knowledge required
Computer with a minimum of 8GB ram/memory
Operating System: Windows / Apple Mac OS / Linux
Reliable internet connection
Any Webbrowser

Description
How to leverage AI and LLMs for both offensive and defensive SecurityYour instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.This course has a both theory and practical lab sections The videos are easy to follow along and replicate. The course features the following:AI/LLM IntroductionModels / UIs and local setupMost common LLM ModelsPrivacy RAG (Retrieval Augmented Generation)Front Ends (Open WebUI, jan ai, lmstudio etc.)Ollama Huggingface PromptingBasicsPrompt EngineeringZero-shot, few-shot, Chain of ThoughtSystem PromptsMake your own bots Prompt leakage Jailbreaking TroubleshootingAPI usageToolsYoloFabric LLM CLIUsing AI/LLM for Offensive SecurityCreate Pentest bots and examplesCreate Redteam bots and examplesHDI attack generationC&C attack generation Using AI/LLM for Defensive SecurityCreate Blue Team bots and examplesIncident Response botTool support companion bots Code analysis bots Notes & DisclaimerThis course is for educational purposes only. This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack.

Who this course is for
Anybody interested in how to use AI/LLM for Offensive Security
Anybody interested in how to use AI/LLM for Defensive Security
Penetration Testers & Red Teamers
Security Engineers & Blue Teamers

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten