Torrent Info
Title [ FreeCourseWeb.com ] Udemy - Pentesting GenAI LLM models - Securing Large Language Models
Category
Size 1.61GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
10 -Demo LLM Application Overview.mp4 6.76MB
10 -Exploring ATT&CK Groups.mp4 20.07MB
10 -Plugin Security LLM Applications.mp4 21.09MB
11 -Excessive Agency.mp4 27.34MB
11 -Importing the LLM Application.mp4 7.31MB
11 -Software in the ATT&CK Framework.mp4 15.59MB
12 -Campaigns Overview.mp4 22.06MB
12 -Overreliance.mp4 35.54MB
13 -ATT&CK Relationships.mp4 15.09MB
13 -Model Theft.mp4 15.98MB
14 -ATT&CK Enterprise Matrix - Hands-On.mp4 200.59MB
1 - About your certificate.html 964B
1 - Bonus lecture.html 6.29KB
1 -Introduction and Course resource.mp4 23.47MB
1 -LLM PENTEST.pptx 10.58MB
1 -Prompt Injection.mp4 18.13MB
1 -Red Teaming LLMs Five Key Techniques.mp4 107.83MB
1 -Reporting.mp4 10.42MB
1 -What is ATT&CK.mp4 24.83MB
1 -What is Penetration Testing.mp4 31.49MB
1 -Why Benchmarks Are Not Enough AI Safety & Security.mp4 14.45MB
1 -Why Penetration Testing is Essential for GenAI.mp4 30.29MB
2 -Ai Application vulnerabilities.ipynb 14.04KB
2 -Comparing Red Teaming and Penetration Testing.mp4 27.66MB
2 -Indirect Prompt Injection Demo.mp4 122.34MB
2 -Indirect Prompt Injection Lab Access.url 101B
2 -LLM Application Vulnerabilities - Demo 01 (Code Explanation).mp4 22.40MB
2 -Remediation and Reporting.mp4 27.21MB
2 -Understanding the Pyramid of Pain.mp4 56.17MB
2 -Why LLMs Are Vulnerable.mp4 19.07MB
3 -Insecure Output Handling Theory.mp4 26.63MB
3 -LLM Application Vulnerabilities - Demo 02 (Biased and Stereotypes).mp4 39.15MB
3 -Overview of ATT&CK Matrices.mp4 11.03MB
3 -Penetration Testing Process.mp4 23.19MB
4 -ATT&CK Tactics.mp4 73.63MB
4 -Exploitation.mp4 20.15MB
4 -Insecure Output Handling Demo.mp4 89.50MB
4 -Insecure Output Handling Lab Access.url 119B
4 -LLM Application Vulnerabilities - Demo 03 (Sensitive Data Disclosure).mp4 37.30MB
5 -ATT&CK Techniques.mp4 29.65MB
5 -LLM Application Vulnerabilities - Demo 04 (Service Disruption).mp4 12.53MB
5 -Post-Exploitation.mp4 31.54MB
5 -Supply Chain Vulnerabilities.mp4 22.72MB
6 -ATT&CK Subtechniques.mp4 43.19MB
6 -LLM Application Vulnerabilities - Demo - 05 (Hallucination).mp4 33.82MB
6 -Model Denial of Service (DoS).mp4 42.31MB
7 -Data Sources for ATT&CK.mp4 15.32MB
7 -Foundation Models vs. LLM Apps.mp4 17.61MB
7 -Stop Model DOS Attack.mp4 16.50MB
8 -Detection Strategies.mp4 17.57MB
8 -Strategies for LLM Application Safety.mp4 17.95MB
8 -Training Data Poisoning.mp4 26.55MB
9 -Examining LLM Vulnerabilities.mp4 14.35MB
9 -Implementing Mitigation Techniques.mp4 20.32MB
9 -Sensitive Information Disclosure.mp4 30.11MB
Bonus Resources.txt 70B
Get Bonus Downloads Here.url 183B
Distribution statistics by country
Russia (RU) 3
India (IN) 2
Morocco (MA) 1
Ethiopia (ET) 1
Brazil (BR) 1
Australia (AU) 1
United States (US) 1
Romania (RO) 1
South Africa (ZA) 1
Total 12
IP List List of IP addresses which were distributed this torrent