资源详情

返回首页 | 相关搜索
[ FreeCourseWeb.com ] Udemy - Pentesting GenAI LLM models - Securing Large Language Models
大小 1.61 GB
文件数 57
Info Hash: A8A594D902DFA3BC51DC72089AB10948EE9566EA
收录时间 2026-01-13 08:57:37
更新时间 2026-01-13 08:57:37
文件列表 (57)
Get Bonus Downloads Here.url
183 B
~Get Your Files Here !/1 - Introduction/1 -Introduction and Course resource.mp4
23.47 MB
~Get Your Files Here !/1 - Introduction/1 -LLM PENTEST.pptx
10.58 MB
~Get Your Files Here !/2 - Introduction to LLM Security & Penetration Testing/1 -What is Penetration Testing.mp4
31.49 MB
~Get Your Files Here !/2 - Introduction to LLM Security & Penetration Testing/2 -Why LLMs Are Vulnerable.mp4
19.07 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/1 -Why Benchmarks Are Not Enough AI Safety & Security.mp4
14.45 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/10 -Demo LLM Application Overview.mp4
6.76 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/11 -Importing the LLM Application.mp4
7.31 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/2 -Ai Application vulnerabilities.ipynb
14.04 KB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/2 -LLM Application Vulnerabilities - Demo 01 (Code Explanation).mp4
22.4 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/3 -LLM Application Vulnerabilities - Demo 02 (Biased and Stereotypes).mp4
39.15 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/4 -LLM Application Vulnerabilities - Demo 03 (Sensitive Data Disclosure).mp4
37.3 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/5 -LLM Application Vulnerabilities - Demo 04 (Service Disruption).mp4
12.53 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/6 -LLM Application Vulnerabilities - Demo - 05 (Hallucination).mp4
33.82 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/7 -Foundation Models vs. LLM Apps.mp4
17.61 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/8 -Strategies for LLM Application Safety.mp4
17.95 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/9 -Examining LLM Vulnerabilities.mp4
14.35 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/1 -Why Penetration Testing is Essential for GenAI.mp4
30.29 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/2 -Comparing Red Teaming and Penetration Testing.mp4
27.66 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/3 -Penetration Testing Process.mp4
23.19 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/4 -Exploitation.mp4
20.15 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/5 -Post-Exploitation.mp4
31.54 MB
~Get Your Files Here !/5 - Red Teaming for LLMs/1 -Red Teaming LLMs Five Key Techniques.mp4
107.83 MB
~Get Your Files Here !/6 - Reporting & Mitigation Strategies/1 -Reporting.mp4
10.42 MB
~Get Your Files Here !/6 - Reporting & Mitigation Strategies/2 -Remediation and Reporting.mp4
27.21 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/1 -What is ATT&CK.mp4
24.83 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/10 -Exploring ATT&CK Groups.mp4
20.07 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/11 -Software in the ATT&CK Framework.mp4
15.59 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/12 -Campaigns Overview.mp4
22.06 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/13 -ATT&CK Relationships.mp4
15.09 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/14 -ATT&CK Enterprise Matrix - Hands-On.mp4
200.59 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/2 -Understanding the Pyramid of Pain.mp4
56.17 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/3 -Overview of ATT&CK Matrices.mp4
11.03 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/4 -ATT&CK Tactics.mp4
73.63 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/5 -ATT&CK Techniques.mp4
29.65 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/6 -ATT&CK Subtechniques.mp4
43.19 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/7 -Data Sources for ATT&CK.mp4
15.32 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/8 -Detection Strategies.mp4
17.57 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/9 -Implementing Mitigation Techniques.mp4
20.32 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/1 -Prompt Injection.mp4
18.13 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/10 -Plugin Security LLM Applications.mp4
21.09 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/11 -Excessive Agency.mp4
27.34 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/12 -Overreliance.mp4
35.54 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/13 -Model Theft.mp4
15.98 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/2 -Indirect Prompt Injection Demo.mp4
122.34 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/2 -Indirect Prompt Injection Lab Access.url
101 B
~Get Your Files Here !/8 - LLM Application Vulnerabilities/3 -Insecure Output Handling Theory.mp4
26.63 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/4 -Insecure Output Handling Demo.mp4
89.5 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/4 -Insecure Output Handling Lab Access.url
119 B
~Get Your Files Here !/8 - LLM Application Vulnerabilities/5 -Supply Chain Vulnerabilities.mp4
22.72 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/6 -Model Denial of Service (DoS).mp4
42.31 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/7 -Stop Model DOS Attack.mp4
16.5 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/8 -Training Data Poisoning.mp4
26.55 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/9 -Sensitive Information Disclosure.mp4
30.11 MB
~Get Your Files Here !/9 - Conclusion/1 - About your certificate.html
964 B
~Get Your Files Here !/9 - Conclusion/1 - Bonus lecture.html
6.29 KB
~Get Your Files Here !/Bonus Resources.txt
70 B

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。