FileMood

Download [ FreeCourseWeb.com ] Udemy - Pentesting GenAI LLM models - Securing Large Language Models

FreeCourseWeb com Udemy Pentesting GenAI LLM models Securing Large Language Models

Name

[ FreeCourseWeb.com ] Udemy - Pentesting GenAI LLM models - Securing Large Language Models

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

1.7 GB

Total Files

57

Last Seen

2025-07-18 00:17

Hash

A8A594D902DFA3BC51DC72089AB10948EE9566EA

/

Get Bonus Downloads Here.url

0.2 KB

/1 - Introduction/

1 -Introduction and Course resource.mp4

24.6 MB

1 -LLM PENTEST.pptx

11.1 MB

/.../2 - Introduction to LLM Security & Penetration Testing/

1 -What is Penetration Testing.mp4

33.0 MB

2 -Why LLMs Are Vulnerable.mp4

20.0 MB

/.../3 - Overview of LLM Vulnerabilities/

1 -Why Benchmarks Are Not Enough AI Safety & Security.mp4

15.1 MB

10 -Demo LLM Application Overview.mp4

7.1 MB

11 -Importing the LLM Application.mp4

7.7 MB

2 -Ai Application vulnerabilities.ipynb

14.4 KB

2 -LLM Application Vulnerabilities - Demo 01 (Code Explanation).mp4

23.5 MB

3 -LLM Application Vulnerabilities - Demo 02 (Biased and Stereotypes).mp4

41.1 MB

4 -LLM Application Vulnerabilities - Demo 03 (Sensitive Data Disclosure).mp4

39.1 MB

5 -LLM Application Vulnerabilities - Demo 04 (Service Disruption).mp4

13.1 MB

6 -LLM Application Vulnerabilities - Demo - 05 (Hallucination).mp4

35.5 MB

7 -Foundation Models vs. LLM Apps.mp4

18.5 MB

8 -Strategies for LLM Application Safety.mp4

18.8 MB

9 -Examining LLM Vulnerabilities.mp4

15.0 MB

/.../4 - Penetration Testing & Red Teaming Fundamentals/

1 -Why Penetration Testing is Essential for GenAI.mp4

31.8 MB

2 -Comparing Red Teaming and Penetration Testing.mp4

29.0 MB

3 -Penetration Testing Process.mp4

24.3 MB

4 -Exploitation.mp4

21.1 MB

5 -Post-Exploitation.mp4

33.1 MB

/.../5 - Red Teaming for LLMs/

1 -Red Teaming LLMs Five Key Techniques.mp4

113.1 MB

/.../6 - Reporting & Mitigation Strategies/

1 -Reporting.mp4

10.9 MB

2 -Remediation and Reporting.mp4

28.5 MB

/.../7 - MITRE ATT&CK Framework for LLMs/

1 -What is ATT&CK.mp4

26.0 MB

10 -Exploring ATT&CK Groups.mp4

21.0 MB

11 -Software in the ATT&CK Framework.mp4

16.4 MB

12 -Campaigns Overview.mp4

23.1 MB

13 -ATT&CK Relationships.mp4

15.8 MB

14 -ATT&CK Enterprise Matrix - Hands-On.mp4

210.3 MB

2 -Understanding the Pyramid of Pain.mp4

58.9 MB

3 -Overview of ATT&CK Matrices.mp4

11.6 MB

4 -ATT&CK Tactics.mp4

77.2 MB

5 -ATT&CK Techniques.mp4

31.1 MB

6 -ATT&CK Subtechniques.mp4

45.3 MB

7 -Data Sources for ATT&CK.mp4

16.1 MB

8 -Detection Strategies.mp4

18.4 MB

9 -Implementing Mitigation Techniques.mp4

21.3 MB

/.../8 - LLM Application Vulnerabilities/

1 -Prompt Injection.mp4

19.0 MB

10 -Plugin Security LLM Applications.mp4

22.1 MB

11 -Excessive Agency.mp4

28.7 MB

12 -Overreliance.mp4

37.3 MB

13 -Model Theft.mp4

16.8 MB

2 -Indirect Prompt Injection Demo.mp4

128.3 MB

2 -Indirect Prompt Injection Lab Access.url

0.1 KB

3 -Insecure Output Handling Theory.mp4

27.9 MB

4 -Insecure Output Handling Demo.mp4

93.8 MB

4 -Insecure Output Handling Lab Access.url

0.1 KB

5 -Supply Chain Vulnerabilities.mp4

23.8 MB

6 -Model Denial of Service (DoS).mp4

44.4 MB

7 -Stop Model DOS Attack.mp4

17.3 MB

8 -Training Data Poisoning.mp4

27.8 MB

9 -Sensitive Information Disclosure.mp4

31.6 MB

/9 - Conclusion/

1 - About your certificate.html

1.0 KB

1 - Bonus lecture.html

6.4 KB

/~Get Your Files Here !/

Bonus Resources.txt

0.1 KB

 

Total files 57


Copyright © 2025 FileMood.com