PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

Udemy AI Security

Category: Courses / Others
Author: AD-TEAM
Date added: 08.12.2024 :52:23
Views: 0
Comments: 0










Description material
Udemy AI Security
3.37 GB | 14min 42s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English



Files Included :
1 -Introduction.mp4 (18.16 MB)
1 -What is a Vulnerability.mp4 (7.28 MB)
2 -Common Vulnerabilities and Exposures (CVE).mp4 (12.47 MB)
3 -Common Vulnerability Scoring System (CVSS).mp4 (25.79 MB)
4 -Log4Shell.mp4 (19.48 MB)
5 -Demo Analyzing an Exploit - Log4Shell.mp4 (29.32 MB)
6 -Heartbleed.mp4 (16.86 MB)
7 -Demo Analyzing an Exploit - Heartbleed.mp4 (19.16 MB)
8 -EternalBlue.mp4 (18.85 MB)
9 -Demo Analyzing an Exploit - EternalBlue.mp4 (21.84 MB)
1 -Demo SQL Injection.mp4 (37.83 MB)
2 -Demo Cross-Site-Scripting (XSS).mp4 (32.44 MB)
1 -What is Copilot for Security.mp4 (20.13 MB)
10 -Demo Create Compute Capacities.mp4 (18.63 MB)
11 -Demo Setup Copilot for Security.mp4 (86.08 MB)
12 -Creating Effective Prompts.mp4 (70.62 MB)
13 -Demo Prompt Usage Monitoring.mp4 (3.28 MB)
14 -Demo Incident Investigation Promptbook.mp4 (92.28 MB)
15 -Demo Suspicious Script Analysis Promptbook.mp4 (105.05 MB)
16 -Demo Threat Actor Profile Promptbook.mp4 (99.35 MB)
17 -Demo Vulnerability Impact Assessment Promptbook.mp4 (64.13 MB)
18 -Demo CTI Prompts.mp4 (122.37 MB)
19 -Demo Vulnerability Assessment Prompts.mp4 (64.15 MB)
2 -From Prompt to Reponse.mp4 (8.06 MB)
3 -Architecture.mp4 (22.73 MB)
4 -Extending Copilot with Plugins & more.mp4 (13.88 MB)
5 -Privacy Implications.mp4 (7.76 MB)
6 -Authentication & RBAC.mp4 (28.8 MB)
7 -Standalone vs Embedded Experience.mp4 (6.34 MB)
8 -Pricing.mp4 (10.06 MB)
9 -Onboarding Requirements.mp4 (3.72 MB)
1 -What is Penetration Testing.mp4 (8.69 MB)
10 -Exploitation.mp4 (4.16 MB)
11 -Post Exploitation.mp4 (7.63 MB)
12 -Reporting.mp4 (5.3 MB)
13 -Remediation & Lessons Learned.mp4 (6.64 MB)
2 -Penetration Testing in Cyber Security.mp4 (8.21 MB)
3 -Red Teaming vs Penetration Testing.mp4 (18.82 MB)
4 -The Importance of Penetration Testing for GenAI.mp4 (5.31 MB)
5 -Overview.mp4 (3.66 MB)
6 -Planning and Preparation.mp4 (8.17 MB)
7 -Reconnaissance.mp4 (6.78 MB)
8 -Scanning & Enumeration.mp4 (3.43 MB)
9 -Vulnerability Assessment.mp4 (8.02 MB)
1 -What is ATT&CK.mp4 (13.5 MB)
10 -Mitigations.mp4 (13.22 MB)
11 -Groups.mp4 (10.78 MB)
12 -Software.mp4 (6.63 MB)
13 -Campaigns.mp4 (24.66 MB)
14 -Relations.mp4 (6.16 MB)
15 -Demo Enterprise Matrix.mp4 (151.76 MB)
16 -What is MITRE ATLAS.mp4 (3.85 MB)
17 -Mapping ATLAS to the Pyramid of Pain.mp4 (4.08 MB)
18 -Tactics.mp4 (6.92 MB)
19 -Techniques.mp4 (9.48 MB)
2 -Mapping ATT&CK to the Pyramid of Pain.mp4 (10.22 MB)
20 -Subtechniques.mp4 (5.96 MB)
21 -Tactics, Techniques, Subtechniques.mp4 (2.9 MB)
22 -Mitigations.mp4 (10.7 MB)
23 -Case Studies.mp4 (8.84 MB)
24 -Case Study I Microsoft Azure Service Disruption.mp4 (7.47 MB)
25 -Case Study II PoisonGPT.mp4 (7.1 MB)
26 -Case Study III ChatGPT Plugin Privacy Leak.mp4 (7.18 MB)
27 -Demo ATLAS Matrix.mp4 (22.94 MB)
3 -Matrices.mp4 (6.27 MB)
4 -Tactics.mp4 (32.26 MB)
5 -Techniques.mp4 (17.91 MB)
6 -Subtechniques.mp4 (28.16 MB)
7 -Tactics, Techniques & Subtechniques.mp4 (6.05 MB)
8 -Data Sources.mp4 (5.67 MB)
9 -Detections.mp4 (6.41 MB)
1 -What is Corporate Governance.mp4 (7.55 MB)
10 -Enhance Monitoring and Feedback Mechanisms.mp4 (8.46 MB)
11 -Define Data and Identity Governance.mp4 (9.25 MB)
12 -Continuous Improvement and Adaptation.mp4 (6.53 MB)
2 -What is Enterprise Risk Management.mp4 (16.48 MB)
3 -What is Cyber Security Risk Management.mp4 (18.28 MB)
4 -Scenario.mp4 (2.14 MB)
5 -Establish a GenAI Governance Committee.mp4 (7.83 MB)
6 -Develop Comprehensive Governance Policies and Guidelines.mp4 (7.45 MB)
7 -Implement Risk Management Practices.mp4 (9.45 MB)
8 -Training and User Awareness Programs.mp4 (9.08 MB)
9 -Adopt AI Ethics and Standards Frameworks.mp4 (6.65 MB)
1 -Cloud Computing Properties.mp4 (18.12 MB)
10 -What is CSPM.mp4 (6.75 MB)
11 -CSPM Plans.mp4 (11.09 MB)
12 -Demo Enable Defender CSPM.mp4 (27.8 MB)
13 -Defender for Cloud RBAC.mp4 (9.23 MB)
14 -Security Recommendations.mp4 (4.88 MB)
15 -Demo Security Recommendations.mp4 (19.67 MB)
16 -Microsoft Cloud Security Benchmark.mp4 (5.56 MB)
17 -Demo Microsoft Cloud Security Benchmark.mp4 (23.91 MB)
18 -Attack Paths.mp4 (6.35 MB)
19 -Demo Defender CSPM for AI.mp4 (24.06 MB)
2 -Cloud Computing Types.mp4 (11.09 MB)
3 -Azure Global Backbone.mp4 (21.31 MB)
4 -Shared Responsibility Model.mp4 (19.67 MB)
5 -Azure Resource Hierarchy.mp4 (10.28 MB)
6 -Azure Subscription Types.mp4 (10.14 MB)
7 -Entra ID Tenants and Azure Subscriptions.mp4 (7.1 MB)
8 -What is Microsoft Defender for Cloud.mp4 (13.07 MB)
9 -CSPM & CWP.mp4 (10.01 MB)
1 -Bonus.mp4 (19.96 MB)
1 -What is GenAI.mp4 (5.94 MB)
2 -What is a Large Language Model (LLM).mp4 (9.2 MB)
3 -What is a Prompt.mp4 (22.57 MB)
4 -AI Models.mp4 (5.12 MB)
5 -LLM Architecture.mp4 (16.29 MB)
1 -The Importance of Security in GenAI.mp4 (25.65 MB)
2 -Threat Vectors for a GenAI Application.mp4 (15.73 MB)
3 -How Adversaries Leverage AI.mp4 (15.87 MB)
4 -Shared Responsibility in AI.mp4 (21.3 MB)
5 -Microsoft Responsible AI.mp4 (12.22 MB)
1 -Demo Create your OpenAI Account.mp4 (2.4 MB)
2 -Demo Create your Portswigger Account.mp4 (11.04 MB)
3 -Demo Create your Azure Subscription.mp4 (6.52 MB)
1 -What is OWASP.mp4 (5.12 MB)
10 -Countermeasures.mp4 (5.14 MB)
11 -LLM03 Training Data Poisoning.mp4 (13.62 MB)
12 -Countermeasures.mp4 (4.94 MB)
13 -LLM04 Model Denial of Service.mp4 (18.4 MB)
14 -Countermeasures.mp4 (5.04 MB)
15 -LLM05 Supply Chain Vulnerabilities.mp4 (13.67 MB)
16 -Demo LLM05 Supply Chain Vulnerabilities.mp4 (53.55 MB)
17 -Countermeasures.mp4 (8.15 MB)
18 -LLM06 Sensitive Information Disclosure.mp4 (20.23 MB)
19 -Countermeasures.mp4 (2.7 MB)
2 -OWASP Top 10 - Web Application Security Risks.mp4 (20.56 MB)
20 -LLM07 Insecure Plugin Design.mp4 (12.67 MB)
21 -Countermeasures.mp4 (12.27 MB)
22 -LLM08 Excessive Agency.mp4 (11.01 MB)
23 -Demo LLM08 Excessive Agency.mp4 (21.2 MB)
24 -Countermeasures.mp4 (7.51 MB)
25 -LLM09 Overreliance.mp4 (14.29 MB)
26 -Countermeasures.mp4 (4.61 MB)
27 -LLM10 Model Theft.mp4 (8.33 MB)
28 -Countermeasures.mp4 (6.39 MB)
3 -OWASP Top 10 - API Security Risks.mp4 (34.06 MB)
4 -OWASP Top 10 - LLM Security Risks.mp4 (22.55 MB)
5 -LLM01 Prompt Injection.mp4 (15.14 MB)
6 -Demo LLM01 Prompt Injection.mp4 (96.69 MB)
7 -Countermeasures.mp4 (8.25 MB)
8 -LLM02 Insecure Output Handling.mp4 (10.34 MB)
9 -Demo LLM02 Insecure Output Handling.mp4 (83.13 MB)
1 -Inherent LLM Risks.mp4 (16.44 MB)
2 -Transparency & Accountability.mp4 (17.43 MB)
3 -Regulatory Compliance.mp4 (12.61 MB)
4 -Hallucinations.mp4 (10.1 MB)
5 -Bias and Discrimination.mp4 (10.5 MB)
6 -Copyright Infringement and Violation of Intellectual Property.mp4 (12.4 MB)
1 -What is a Threat.mp4 (7.29 MB)
10 -A GenAI Security Architecture.mp4 (11.89 MB)
2 -Threat, Vulnerability & Risk.mp4 (5.58 MB)
3 -What is Threat Modeling.mp4 (6 MB)
4 -Involved Organizations.mp4 (18.24 MB)
5 -Scope Definition.mp4 (6.28 MB)
6 -Threat Identification.mp4 (8.09 MB)
7 -Vulnerability Analysis.mp4 (6.03 MB)
8 -Mitigation Strategy Development.mp4 (5.98 MB)
9 -Documentation and Evolution.mp4 (6.19 MB)
1 -What is a SOC.mp4 (17.89 MB)
10 -Demo Decoding and analyzing base64 reverse shell.mp4 (37.34 MB)
11 -Demo Create an Incident Response Playbook.mp4 (50.06 MB)
2 -SOC Tier Model.mp4 (14.19 MB)
3 -Cyber Security Incident Response Process.mp4 (10.67 MB)
4 -EDR, XDR, SIEM & SOAR.mp4 (22.29 MB)
5 -Demo Data Sources for a SIEM.mp4 (23.27 MB)
6 -Demo Use Cases for a SIEM.mp4 (46.94 MB)
7 -Demo Data Sources for Microsoft Sentinel.mp4 (43.7 MB)
8 -Demo Analytic Rules for Microsoft Sentinel.mp4 (24.36 MB)
9 -Demo Generating YARA Rules.mp4 (39.29 MB)
1 -Intelligence, Threat Intelligence & Cyber Threat Intelligence (CTI).mp4 (9.12 MB)
10 -Demo Assist with IOCs.mp4 (45.3 MB)
11 -Demo Generate Threat Hunting Queries in KQL.mp4 (49.07 MB)
2 -What is CTI.mp4 (10.78 MB)
3 -Threat, Vulnerability & Risk.mp4 (5.58 MB)
4 -Threat-Informed Defense.mp4 (11.61 MB)
5 -Tactics, Techniques & Procedures (TTPs).mp4 (16.51 MB)
6 -IOCs & IOAs.mp4 (14.09 MB)
7 -Pyramid of Pain.mp4 (13.08 MB)
8 -CTI Sources.mp4 (7.66 MB)
9 -Demo Describe CTI.mp4 (40.19 MB)]
Screenshot



Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: