How to use AI and LLMs for Offensive and Defensive Security
Free Download How to use AI and LLMs for Offensive and Defensive Security
Published 11/2024
Created by Martin Voelk
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 23 Lectures ( 3h 46m ) | Size: 2.45 GB
Learn how to leverage AI/LLMs for your day-to-day job in both offensive and defensive security. Be ahead of the curve!
What you'll learn
Models / UIs and local setup
Most common LLM Models
Privacy
RAG (Retrieval Augmented Generation)
Front Ends (Open WebUI, jan ai, lmstudio etc.)
Ollama
Huggingface
Prompting and Prompt Engineering
Zero-shot, few-shot, Chain of Thought
System Prompts
Make your own bots
Prompt leakage
Jailbreaking
Troubleshooting
API usage
Yolo tool
Fabric tool
LLM CLI
Using AI/LLM for Offensive Security
Using AI/LLM for Defensive Security
Requirements
Basic IT Skills
Basic understanding of web technology
No programming or hacking knowledge required
Computer with a minimum of 8GB ram/memory
Operating System: Windows / Apple Mac OS / Linux
Reliable internet connection
Any Webbrowser
Description
How to leverage AI and LLMs for both offensive and defensive SecurityYour instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.This course has a both theory and practical lab sections The videos are easy to follow along and replicate. The course features the following:AI/LLM IntroductionModels / UIs and local setupMost common LLM ModelsPrivacy RAG (Retrieval Augmented Generation)Front Ends (Open WebUI, jan ai, lmstudio etc.)Ollama Huggingface PromptingBasicsPrompt EngineeringZero-shot, few-shot, Chain of ThoughtSystem PromptsMake your own bots Prompt leakage Jailbreaking TroubleshootingAPI usageToolsYoloFabric LLM CLIUsing AI/LLM for Offensive SecurityCreate Pentest bots and examplesCreate Redteam bots and examplesHDI attack generationC&C attack generation Using AI/LLM for Defensive SecurityCreate Blue Team bots and examplesIncident Response botTool support companion bots Code analysis bots Notes & DisclaimerThis course is for educational purposes only. This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack.
Who this course is for
Anybody interested in how to use AI/LLM for Offensive Security
Anybody interested in how to use AI/LLM for Defensive Security
Penetration Testers & Red Teamers
Security Engineers & Blue Teamers
Homepage
https://www.udemy.com/course/how-to-use-ai-and-llms-for-offensive-and-defensive-security/
Rapidgator
xurgm.How.to.use.AI.and.LLMs.for.Offensive.and.Defensive.Security.part1.rar.html
xurgm.How.to.use.AI.and.LLMs.for.Offensive.and.Defensive.Security.part3.rar.html
xurgm.How.to.use.AI.and.LLMs.for.Offensive.and.Defensive.Security.part2.rar.html
Fikper
xurgm.How.to.use.AI.and.LLMs.for.Offensive.and.Defensive.Security.part3.rar.html
xurgm.How.to.use.AI.and.LLMs.for.Offensive.and.Defensive.Security.part1.rar.html
xurgm.How.to.use.AI.and.LLMs.for.Offensive.and.Defensive.Security.part2.rar.html
How to use AI and LLMs for Offensive and Defensive Security Torrent Download , How to use AI and LLMs for Offensive and Defensive Security Watch Free Online , How to use AI and LLMs for Offensive and Defensive Security Download Online
In today's era of digital learning, access to high-quality educational resources has become more accessible than ever, with a plethora of platforms offering free download video courses in various disciplines. One of the most sought-after categories among learners is the skillshar free video editing course, which provides aspiring creators with the tools and techniques needed to master the art of video production. These courses cover everything from basic editing principles to advanced techniques, empowering individuals to unleash their creativity and produce professional-quality content.
Comments (0)
Users of Guests are not allowed to comment this publication.