Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
10 -Demo LLM Application Overview.mp4 |
6.76MB |
10 -Exploring ATT&CK Groups.mp4 |
20.07MB |
10 -Plugin Security LLM Applications.mp4 |
21.09MB |
11 -Excessive Agency.mp4 |
27.34MB |
11 -Importing the LLM Application.mp4 |
7.31MB |
11 -Software in the ATT&CK Framework.mp4 |
15.59MB |
12 -Campaigns Overview.mp4 |
22.06MB |
12 -Overreliance.mp4 |
35.54MB |
13 -ATT&CK Relationships.mp4 |
15.09MB |
13 -Model Theft.mp4 |
15.98MB |
14 -ATT&CK Enterprise Matrix - Hands-On.mp4 |
200.59MB |
1 - About your certificate.html |
964B |
1 - Bonus lecture.html |
6.29KB |
1 -Introduction and Course resource.mp4 |
23.47MB |
1 -LLM PENTEST.pptx |
10.58MB |
1 -Prompt Injection.mp4 |
18.13MB |
1 -Red Teaming LLMs Five Key Techniques.mp4 |
107.83MB |
1 -Reporting.mp4 |
10.42MB |
1 -What is ATT&CK.mp4 |
24.83MB |
1 -What is Penetration Testing.mp4 |
31.49MB |
1 -Why Benchmarks Are Not Enough AI Safety & Security.mp4 |
14.45MB |
1 -Why Penetration Testing is Essential for GenAI.mp4 |
30.29MB |
2 -Ai Application vulnerabilities.ipynb |
14.04KB |
2 -Comparing Red Teaming and Penetration Testing.mp4 |
27.66MB |
2 -Indirect Prompt Injection Demo.mp4 |
122.34MB |
2 -Indirect Prompt Injection Lab Access.url |
101B |
2 -LLM Application Vulnerabilities - Demo 01 (Code Explanation).mp4 |
22.40MB |
2 -Remediation and Reporting.mp4 |
27.21MB |
2 -Understanding the Pyramid of Pain.mp4 |
56.17MB |
2 -Why LLMs Are Vulnerable.mp4 |
19.07MB |
3 -Insecure Output Handling Theory.mp4 |
26.63MB |
3 -LLM Application Vulnerabilities - Demo 02 (Biased and Stereotypes).mp4 |
39.15MB |
3 -Overview of ATT&CK Matrices.mp4 |
11.03MB |
3 -Penetration Testing Process.mp4 |
23.19MB |
4 -ATT&CK Tactics.mp4 |
73.63MB |
4 -Exploitation.mp4 |
20.15MB |
4 -Insecure Output Handling Demo.mp4 |
89.50MB |
4 -Insecure Output Handling Lab Access.url |
119B |
4 -LLM Application Vulnerabilities - Demo 03 (Sensitive Data Disclosure).mp4 |
37.30MB |
5 -ATT&CK Techniques.mp4 |
29.65MB |
5 -LLM Application Vulnerabilities - Demo 04 (Service Disruption).mp4 |
12.53MB |
5 -Post-Exploitation.mp4 |
31.54MB |
5 -Supply Chain Vulnerabilities.mp4 |
22.72MB |
6 -ATT&CK Subtechniques.mp4 |
43.19MB |
6 -LLM Application Vulnerabilities - Demo - 05 (Hallucination).mp4 |
33.82MB |
6 -Model Denial of Service (DoS).mp4 |
42.31MB |
7 -Data Sources for ATT&CK.mp4 |
15.32MB |
7 -Foundation Models vs. LLM Apps.mp4 |
17.61MB |
7 -Stop Model DOS Attack.mp4 |
16.50MB |
8 -Detection Strategies.mp4 |
17.57MB |
8 -Strategies for LLM Application Safety.mp4 |
17.95MB |
8 -Training Data Poisoning.mp4 |
26.55MB |
9 -Examining LLM Vulnerabilities.mp4 |
14.35MB |
9 -Implementing Mitigation Techniques.mp4 |
20.32MB |
9 -Sensitive Information Disclosure.mp4 |
30.11MB |
Bonus Resources.txt |
70B |
Get Bonus Downloads Here.url |
183B |