Udemy - AI Security (2024)

dkmdkm

U P L O A D E R
7a25149f16727c80c75b00148dee7b7b.jpg

Free Download Udemy - AI Security (2024)
Published 11/2024
Created by Christopher Nett
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 187 Lectures ( 10h 31m ) | Size: 3.37 GB

Cyber Security with GenAI | OWASP Top 10 for LLMs | MITRE ATLAS | ChatGPT | Microsoft Security Copilot
What you'll learn
Explore the fundamentals of generative AI, including its principles, applications, and implications for cyber security.
Learn Cyber Security with generative AI
Learn how to write effective prompts for Cyber Security with generative AI
Learn advanced concepts for Cyber Security with generative AI
Learn how generative AI and ChatGPT are transforming cyber security
Learn to leverage ChatGPT for SOC
Learn to leverage ChatGPT for CTI
Learn to leverage Microsoft Copilot for Security for SOC
Learn to leverage Microsoft Copilot for Security for CTI
Review the OWASP Top 10 vulnerabilities specific to large language models and how to mitigate them.
Get acquainted with the MITRE ATLAS framework and its application to generative AI threat analysis.
Develop skills in threat modeling to identify, assess, and address potential security threats to generative AI systems.
Design and implement a robust security architecture tailored for generative AI environments.
Analyze a detailed case study on exploiting large language models to understand potential vulnerabilities and protective measures.
Build a Governance Program for GenAI
Learn about common attacks on Generative AI systems and how to defend against them.
Understand the core concepts and methodologies involved in penetration testing for Large Language Models (LLMs).
Learn the step-by-step process of conducting penetration tests specifically tailored for Generative AI systems.
Requirements
Basic IT Knowledge
Willingness to learn cool stuff!
Description
AI Security by Christopher Nett is a meticulously structured Udemy course aimed at IT professionals seeking to master AI Security. This course systematically walks you through the initial basics to advanced concepts with applied case studies. You will gain a deep understanding of the principles and practices necessary for AI Security.Key benefits for you:Generative AI Basics: Understand the fundamental concepts and techniques that underpin generative AI and its applications.Cyber Security for GenAI: Explore strategies and best practices for securing generative AI systems against cyber threats.OWASP Top 10 for LLMs: Understand the core threats, vulnerabilities, and risks associated with Large Language Models.Other Risks for GenAI: Understand additional risks associated with generative AI, including ethical concerns, bias, and compliance issues.Threat Modeling: Develop skills in threat modeling to identify, assess, and address potential security threats to generative AI systems.ChatGPT for SOC: Leverage ChatGPT to enhance SOC operations with threat detection and response.ChatGPT for CTI: Utilize ChatGPT to analyze threat data and generate actionable intelligence reports.ChatGPT for Vulnerability Management: Leverage ChatGPT to identify, assess, and prioritize vulnerabilities efficiently.ChatGPT for Application Security: Apply ChatGPT to automate security testing and ensure application integrity.Microsoft Copilot for Security: Harness Microsoft Copilot to integrate AI-driven insights and automate security tasks within your infrastructure.The Penetration Testing Process for GenAI: Learn the step-by-step process of conducting penetration tests specifically tailored for Generative AI systems.MITRE ATLAS: Explore the MITRE ATLAS framework for assessing AI and ML security.Governance for GenAI: Building a Governance Program for GenAI: Gain insights from a practical example on how to develop and implement a comprehensive governance program for generative AI within an organization.Secure AI with Microsoft Defender for Cloud: Gain hands-on experience by applying the security principles and practices learned throughout the course in combination with Microsoft Defender CSPM.
Who this course is for
SOC Analyst
Security Engineer
Security Consultant
Security Architect
Security Manager
CISO
Security Professional
Cyber Threat Hunter
Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!



Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar
537368816_que-es-udemy-analisis-opiniones.jpg

3.37 GB | 14min 42s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English


Files Included :
1 -Introduction.mp4 (18.16 MB)
1 -What is a Vulnerability.mp4 (7.28 MB)
2 -Common Vulnerabilities and Exposures (CVE).mp4 (12.47 MB)
3 -Common Vulnerability Scoring System (CVSS).mp4 (25.79 MB)
4 -Log4Shell.mp4 (19.48 MB)
5 -Demo Analyzing an Exploit - Log4Shell.mp4 (29.32 MB)
6 -Heartbleed.mp4 (16.86 MB)
7 -Demo Analyzing an Exploit - Heartbleed.mp4 (19.16 MB)
8 -EternalBlue.mp4 (18.85 MB)
9 -Demo Analyzing an Exploit - EternalBlue.mp4 (21.84 MB)
1 -Demo SQL Injection.mp4 (37.83 MB)
2 -Demo Cross-Site-Scripting (XSS).mp4 (32.44 MB)
1 -What is Copilot for Security.mp4 (20.13 MB)
10 -Demo Create Compute Capacities.mp4 (18.63 MB)
11 -Demo Setup Copilot for Security.mp4 (86.08 MB)
12 -Creating Effective Prompts.mp4 (70.62 MB)
13 -Demo Prompt Usage Monitoring.mp4 (3.28 MB)
14 -Demo Incident Investigation Promptbook.mp4 (92.28 MB)
15 -Demo Suspicious Script Analysis Promptbook.mp4 (105.05 MB)
16 -Demo Threat Actor Profile Promptbook.mp4 (99.35 MB)
17 -Demo Vulnerability Impact Assessment Promptbook.mp4 (64.13 MB)
18 -Demo CTI Prompts.mp4 (122.37 MB)
19 -Demo Vulnerability Assessment Prompts.mp4 (64.15 MB)
2 -From Prompt to Reponse.mp4 (8.06 MB)
3 -Architecture.mp4 (22.73 MB)
4 -Extending Copilot with Plugins & more.mp4 (13.88 MB)
5 -Privacy Implications.mp4 (7.76 MB)
6 -Authentication & RBAC.mp4 (28.8 MB)
7 -Standalone vs Embedded Experience.mp4 (6.34 MB)
8 -Pricing.mp4 (10.06 MB)
9 -Onboarding Requirements.mp4 (3.72 MB)
1 -What is Penetration Testing.mp4 (8.69 MB)
10 -Exploitation.mp4 (4.16 MB)
11 -Post Exploitation.mp4 (7.63 MB)
12 -Reporting.mp4 (5.3 MB)
13 -Remediation & Lessons Learned.mp4 (6.64 MB)
2 -Penetration Testing in Cyber Security.mp4 (8.21 MB)
3 -Red Teaming vs Penetration Testing.mp4 (18.82 MB)
4 -The Importance of Penetration Testing for GenAI.mp4 (5.31 MB)
5 -Overview.mp4 (3.66 MB)
6 -Planning and Preparation.mp4 (8.17 MB)
7 -Reconnaissance.mp4 (6.78 MB)
8 -Scanning & Enumeration.mp4 (3.43 MB)
9 -Vulnerability Assessment.mp4 (8.02 MB)
1 -What is ATT&CK.mp4 (13.5 MB)
10 -Mitigations.mp4 (13.22 MB)
11 -Groups.mp4 (10.78 MB)
12 -Software.mp4 (6.63 MB)
13 -Campaigns.mp4 (24.66 MB)
14 -Relations.mp4 (6.16 MB)
15 -Demo Enterprise Matrix.mp4 (151.76 MB)
16 -What is MITRE ATLAS.mp4 (3.85 MB)
17 -Mapping ATLAS to the Pyramid of Pain.mp4 (4.08 MB)
18 -Tactics.mp4 (6.92 MB)
19 -Techniques.mp4 (9.48 MB)
2 -Mapping ATT&CK to the Pyramid of Pain.mp4 (10.22 MB)
20 -Subtechniques.mp4 (5.96 MB)
21 -Tactics, Techniques, Subtechniques.mp4 (2.9 MB)
22 -Mitigations.mp4 (10.7 MB)
23 -Case Studies.mp4 (8.84 MB)
24 -Case Study I Microsoft Azure Service Disruption.mp4 (7.47 MB)
25 -Case Study II PoisonGPT.mp4 (7.1 MB)
26 -Case Study III ChatGPT Plugin Privacy Leak.mp4 (7.18 MB)
27 -Demo ATLAS Matrix.mp4 (22.94 MB)
3 -Matrices.mp4 (6.27 MB)
4 -Tactics.mp4 (32.26 MB)
5 -Techniques.mp4 (17.91 MB)
6 -Subtechniques.mp4 (28.16 MB)
7 -Tactics, Techniques & Subtechniques.mp4 (6.05 MB)
8 -Data Sources.mp4 (5.67 MB)
9 -Detections.mp4 (6.41 MB)
1 -What is Corporate Governance.mp4 (7.55 MB)
10 -Enhance Monitoring and Feedback Mechanisms.mp4 (8.46 MB)
11 -Define Data and Identity Governance.mp4 (9.25 MB)
12 -Continuous Improvement and Adaptation.mp4 (6.53 MB)
2 -What is Enterprise Risk Management.mp4 (16.48 MB)
3 -What is Cyber Security Risk Management.mp4 (18.28 MB)
4 -Scenario.mp4 (2.14 MB)
5 -Establish a GenAI Governance Committee.mp4 (7.83 MB)
6 -Develop Comprehensive Governance Policies and Guidelines.mp4 (7.45 MB)
7 -Implement Risk Management Practices.mp4 (9.45 MB)
8 -Training and User Awareness Programs.mp4 (9.08 MB)
9 -Adopt AI Ethics and Standards Frameworks.mp4 (6.65 MB)
1 -Cloud Computing Properties.mp4 (18.12 MB)
10 -What is CSPM.mp4 (6.75 MB)
11 -CSPM Plans.mp4 (11.09 MB)
12 -Demo Enable Defender CSPM.mp4 (27.8 MB)
13 -Defender for Cloud RBAC.mp4 (9.23 MB)
14 -Security Recommendations.mp4 (4.88 MB)
15 -Demo Security Recommendations.mp4 (19.67 MB)
16 -Microsoft Cloud Security Benchmark.mp4 (5.56 MB)
17 -Demo Microsoft Cloud Security Benchmark.mp4 (23.91 MB)
18 -Attack Paths.mp4 (6.35 MB)
19 -Demo Defender CSPM for AI.mp4 (24.06 MB)
2 -Cloud Computing Types.mp4 (11.09 MB)
3 -Azure Global Backbone.mp4 (21.31 MB)
4 -Shared Responsibility Model.mp4 (19.67 MB)
5 -Azure Resource Hierarchy.mp4 (10.28 MB)
6 -Azure Subscription Types.mp4 (10.14 MB)
7 -Entra ID Tenants and Azure Subscriptions.mp4 (7.1 MB)
8 -What is Microsoft Defender for Cloud.mp4 (13.07 MB)
9 -CSPM & CWP.mp4 (10.01 MB)
1 -Bonus.mp4 (19.96 MB)
1 -What is GenAI.mp4 (5.94 MB)
2 -What is a Large Language Model (LLM).mp4 (9.2 MB)
3 -What is a Prompt.mp4 (22.57 MB)
4 -AI Models.mp4 (5.12 MB)
5 -LLM Architecture.mp4 (16.29 MB)
1 -The Importance of Security in GenAI.mp4 (25.65 MB)
2 -Threat Vectors for a GenAI Application.mp4 (15.73 MB)
3 -How Adversaries Leverage AI.mp4 (15.87 MB)
4 -Shared Responsibility in AI.mp4 (21.3 MB)
5 -Microsoft Responsible AI.mp4 (12.22 MB)
1 -Demo Create your OpenAI Account.mp4 (2.4 MB)
2 -Demo Create your Portswigger Account.mp4 (11.04 MB)
3 -Demo Create your Azure Subscription.mp4 (6.52 MB)
1 -What is OWASP.mp4 (5.12 MB)
10 -Countermeasures.mp4 (5.14 MB)
11 -LLM03 Training Data Poisoning.mp4 (13.62 MB)
12 -Countermeasures.mp4 (4.94 MB)
13 -LLM04 Model Denial of Service.mp4 (18.4 MB)
14 -Countermeasures.mp4 (5.04 MB)
15 -LLM05 Supply Chain Vulnerabilities.mp4 (13.67 MB)
16 -Demo LLM05 Supply Chain Vulnerabilities.mp4 (53.55 MB)
17 -Countermeasures.mp4 (8.15 MB)
18 -LLM06 Sensitive Information Disclosure.mp4 (20.23 MB)
19 -Countermeasures.mp4 (2.7 MB)
2 -OWASP Top 10 - Web Application Security Risks.mp4 (20.56 MB)
20 -LLM07 Insecure Plugin Design.mp4 (12.67 MB)
21 -Countermeasures.mp4 (12.27 MB)
22 -LLM08 Excessive Agency.mp4 (11.01 MB)
23 -Demo LLM08 Excessive Agency.mp4 (21.2 MB)
24 -Countermeasures.mp4 (7.51 MB)
25 -LLM09 Overreliance.mp4 (14.29 MB)
26 -Countermeasures.mp4 (4.61 MB)
27 -LLM10 Model Theft.mp4 (8.33 MB)
28 -Countermeasures.mp4 (6.39 MB)
3 -OWASP Top 10 - API Security Risks.mp4 (34.06 MB)
4 -OWASP Top 10 - LLM Security Risks.mp4 (22.55 MB)
5 -LLM01 Prompt Injection.mp4 (15.14 MB)
6 -Demo LLM01 Prompt Injection.mp4 (96.69 MB)
7 -Countermeasures.mp4 (8.25 MB)
8 -LLM02 Insecure Output Handling.mp4 (10.34 MB)
9 -Demo LLM02 Insecure Output Handling.mp4 (83.13 MB)
1 -Inherent LLM Risks.mp4 (16.44 MB)
2 -Transparency & Accountability.mp4 (17.43 MB)
3 -Regulatory Compliance.mp4 (12.61 MB)
4 -Hallucinations.mp4 (10.1 MB)
5 -Bias and Discrimination.mp4 (10.5 MB)
6 -Copyright Infringement and Violation of Intellectual Property.mp4 (12.4 MB)
1 -What is a Threat.mp4 (7.29 MB)
10 -A GenAI Security Architecture.mp4 (11.89 MB)
2 -Threat, Vulnerability & Risk.mp4 (5.58 MB)
3 -What is Threat Modeling.mp4 (6 MB)
4 -Involved Organizations.mp4 (18.24 MB)
5 -Scope Definition.mp4 (6.28 MB)
6 -Threat Identification.mp4 (8.09 MB)
7 -Vulnerability Analysis.mp4 (6.03 MB)
8 -Mitigation Strategy Development.mp4 (5.98 MB)
9 -Documentation and Evolution.mp4 (6.19 MB)
1 -What is a SOC.mp4 (17.89 MB)
10 -Demo Decoding and analyzing base64 reverse shell.mp4 (37.34 MB)
11 -Demo Create an Incident Response Playbook.mp4 (50.06 MB)
2 -SOC Tier Model.mp4 (14.19 MB)
3 -Cyber Security Incident Response Process.mp4 (10.67 MB)
4 -EDR, XDR, SIEM & SOAR.mp4 (22.29 MB)
5 -Demo Data Sources for a SIEM.mp4 (23.27 MB)
6 -Demo Use Cases for a SIEM.mp4 (46.94 MB)
7 -Demo Data Sources for Microsoft Sentinel.mp4 (43.7 MB)
8 -Demo Analytic Rules for Microsoft Sentinel.mp4 (24.36 MB)
9 -Demo Generating YARA Rules.mp4 (39.29 MB)
1 -Intelligence, Threat Intelligence & Cyber Threat Intelligence (CTI).mp4 (9.12 MB)
10 -Demo Assist with IOCs.mp4 (45.3 MB)
11 -Demo Generate Threat Hunting Queries in KQL.mp4 (49.07 MB)
2 -What is CTI.mp4 (10.78 MB)
3 -Threat, Vulnerability & Risk.mp4 (5.58 MB)
4 -Threat-Informed Defense.mp4 (11.61 MB)
5 -Tactics, Techniques & Procedures (TTPs).mp4 (16.51 MB)
6 -IOCs & IOAs.mp4 (14.09 MB)
7 -Pyramid of Pain.mp4 (13.08 MB)
8 -CTI Sources.mp4 (7.66 MB)
9 -Demo Describe CTI.mp4 (40.19 MB)
]
Screenshot
dk4mngkI_o.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten