[ WebToolTip.com ] Udemy - Intro to LLM Security - OWASP Top 10 for Large Language Mode
大小1.31 GB
文件数44
Info Hash:4E8ACEEE5D3467C16E16513AD501A1DF4C1D0F73
收录时间2025-12-15 15:34:41
更新时间2025-12-16 00:40:53
文件列表 (44)
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/1 - Introduction.mp4
23.59 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/2 - Content Download - Download Course Content.url
75 B
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/2 - Content Download.mp4
1.98 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/2 -Download Course Content.url
75 B
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/3 - Module One Overview.mp4
5.95 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/4 - The Rise of LLMs and New Attack Surfaces.mp4
61.94 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/5 - What is the OWASP Top 10 for LLM Applications.mp4
89.35 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/6 - Prioritizing Risk Prevalence, Exploitability, and Impact.mp4
37.77 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/7 - Secure Development Lifecycle (SDLC) for LLM Applications.mp4
54 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/8 - Whiteboard Solution - Analyze and mitigate risk in your LLM applications.mp4
86.26 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/9 - Module Review Summary.mp4
11.5 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/1 - Module Two Overview.mp4
13.83 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/2 - Understanding IO Vulnerabilities.mp4
24.36 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/3 - LLM01 Prompt Injection (The #1 Risk).mp4
54.63 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/4 - LLM05 Improper Output Handling.mp4
37.84 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/5 - LLM07 System Prompt Leakage.mp4
55.47 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/6 - Whiteboard - Prompt Injection Scenario.mp4
27.74 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/7 - Module Review Summary.mp4
17.81 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/1 - Module Three Overview.mp4
8.77 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/2 - Understanding Data, Model and Supply Chain Risks.mp4
24.82 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/3 - LLM02 Sensitive Information Disclosure.mp4
48.52 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/4 - LLM04 Data and Model Poisoning.mp4
26.57 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/5 - LLM03 Supply Chain Vulnerabilities.mp4
53.69 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/6 - Whiteboard Solution - Supply Chains.mp4
67.4 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/7 - Module Review Summary.mp4
9.6 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/1 - Module Four Overview.mp4
6.11 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/2 - Understanding Runtime, Control and Operational Issues.mp4
15.05 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/3 - LLM06 Excessive Agency.mp4
30.42 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/4 - LLM09 Misinformation and Overreliance.mp4
21.83 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/5 - LLM10 Unbounded Consumption.mp4
47.48 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/6 - LLM08 Vector and Embedding Weaknesses.mp4
26.35 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/7 - Module Review Summary.mp4
24.68 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/1 - Module Five Overview.mp4
7.41 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/10 - Resources and Closeout.mp4
14.77 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/2 - Defense in Depth.mp4
60.04 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/3 - Risk Management.mp4
43.4 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/4 - AI Lifecycle.mp4
33.42 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/5 - NIST AI Lifecycle.mp4
55.52 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/6 - LLM Security Testing.mp4
40.66 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/7 - Operational Security for AIML.mp4
35.52 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/8 - The Future of LLM Security and Emerging Threats.mp4
23.06 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/9 - Module Review Summary.mp4