[ WebToolTip.com ] Udemy - GenAI Cybersecurity - OWASP Top 10, MITRE ATLAS and API Attacks

WebToolTip com Udemy - GenAI Cybersecurity - OWASP Top 10 MITRE ATLAS and API Attacks

File Size: 1.53 GB

Creat Time: 2025-06-08 00:54:01

Last Active: 2025-06-08 00:54:01

Active Degree: 1

Magnet Link: Magnet LinkMagnet Link

Statement: This site does not provide download links, only text displays, and does not contain any infringement.

File List:

  1. ~Get Your Files Here !/7 - MITRE ATLAS Mapping for LLM Attacks/2 -Mapping AI Threats with MITRE ATLAS OpenAI vs. DeepSeek Case Study.mp4 148.77 MB
  2. ~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/3 -Hands-On Demo Exploiting an Insecure Ollama API Setup.mp4 128.72 MB
  3. ~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/6 -Mitigating OLAMA API Risks with NGINX Authentication (Hands-On Demo).mp4 77.33 MB
  4. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/9 -How Self-Attention Builds Rich Contextual Understanding in Transformers.mp4 69.10 MB
  5. ~Get Your Files Here !/5 - OWASP Top 10 for LLMs Understanding AI-Specific Security Risks/2 -OWASP Top 10 Risks for LLMs + Case Study Mapping.mp4 50.23 MB
  6. ~Get Your Files Here !/8 - Hands-On Lab Exploiting AI Decisions in LLM APIs/2 -Lab Demo – Exploiting LLM APIs with Excessive Agency (PortSwigger).mp4 47.15 MB
  7. ~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/9 -Scenario 2 Deep Dive into LLM Attack Surfaces from the Provider Side.mp4 46.28 MB
  8. ~Get Your Files Here !/3 - Anatomy of an LLM System and Its Security Attack Surface/6 -LLM Processing Unit Explained Inference Handling, Prompt Cntrl & Runtime Logic.mp4 42.94 MB
  9. ~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/4 -Ollama in the Wild Real-World Exposure via Shodan + Developer Risk Behavior.mp4 42.78 MB
  10. ~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/11 -Inference and Log Data Exposure DeepSeek’s AI Leak Case Study.mp4 40.71 MB
  11. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/6 -Understanding Recurrent Neural Networks (RNNs) for Language Processing.mp4 38.88 MB
  12. ~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/10 -Training Data Poisoning Case Study How Microsoft Tay Was Manipulated on Twitter.mp4 35.72 MB
  13. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/11 -Summary of Transformer Innovations Key Concepts Behind LLMs.mp4 29.48 MB
  14. ~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/14 -Section 3 Wrap-Up LLM Attack Surface Lessons + What’s Next with OWASP Top 10.mp4 28.86 MB
  15. ~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/8 -Prompt Injection Demonstration How a $1 Chevy Tahoe Chatbot Reply Went Viral.mp4 28.39 MB
  16. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/7 -How Transformers and LLMs Revolutionized Language Processing.mp4 26.37 MB
  17. ~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/12 -LLM Model Exposure How Misconfigured Ollama APIs Opened the Door.mp4 26.24 MB
  18. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/3 -Where Large Language Models Fit in the Generative AI Landscape.mp4 25.55 MB
  19. ~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/7 -How One Misconfigured LLM API Triggers Multiple OWASP Risks.mp4 25.47 MB
  20. ~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/7 -Scenario 1 LLM Attack Surfaces in Organizations Using AI Models.mp4 25.26 MB
  21. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/10 -Understanding Multi-Head Attention in Transformers Multiple Views of Language.mp4 24.53 MB
  22. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/15 -Wrapping Up Section 1 Deep Dive into Large Language Models (LLMs).mp4 24.25 MB
  23. ~Get Your Files Here !/3 - Anatomy of an LLM System and Its Security Attack Surface/8 -The Application Layer How Users Interact with LLM Systems.mp4 23.80 MB
  24. ~Get Your Files Here !/1 - Introduction/1 -Welcome to the Course + Instructor Intro + What You’ll Learn.mp4 22.87 MB
  25. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/14 -Challenges and Risks of Large Language Models (LLMs).mp4 22.72 MB
  26. ~Get Your Files Here !/3 - Anatomy of an LLM System and Its Security Attack Surface/9 -LLM System Summary & Preparing for Attack Surface Analysis.mp4 22.27 MB
  27. ~Get Your Files Here !/3 - Anatomy of an LLM System and Its Security Attack Surface/7 -Understanding the Integration Layer APIs, SDKs, and Plugins in LLM Systems.mp4 22.18 MB
  28. ~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/5 -Why Large Language Models Have Bigger and Riskier Attack Surfaces.mp4 20.97 MB
  29. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/5 -Understanding Convolutional Neural Networks for Image Recognition.mp4 19.75 MB
  30. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/4 -Evolution of LLMs From Early Neural Networks to Transformers.mp4 19.68 MB
  31. ~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/13 -LLM Providers vs. Organizations Who Secures What.mp4 19.01 MB
  32. ~Get Your Files Here !/9 - LLM Cybersecurity Summary & Career Tips/2 -Course Recap What You’ve Learned in LLM Cybersecurity.mp4 16.26 MB
  33. ~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/8 -Wrap-Up LLM API Exposure, Mitigation & OWASP Risk Summary.mp4 15.99 MB
  34. ~Get Your Files Here !/9 - LLM Cybersecurity Summary & Career Tips/9 -Course Wrap-Up Thank You and Final Reflections.mp4 15.79 MB
  35. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/2 -What Are LLMs Understanding Large Language Models Explained.mp4 15.40 MB
  36. ~Get Your Files Here !/8 - Hands-On Lab Exploiting AI Decisions in LLM APIs/3 -How to Access and Practice the PortSwigger LLM Lab Yourself.mp4 15.33 MB
  37. ~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/5 -Mitigation Setup Securing Ollama API with NGINX Reverse Proxy.mp4 14.36 MB
  38. ~Get Your Files Here !/3 - Anatomy of an LLM System and Its Security Attack Surface/5 -The Infrastructure Layer of LLM Systems Powering and Securing the Core.mp4 13.44 MB
  39. ~Get Your Files Here !/8 - Hands-On Lab Exploiting AI Decisions in LLM APIs/1 -PortSwigger Lab Introduction Exploiting LLM APIs with Excessive Agency.mp4 13.08 MB
  40. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/13 -Types of LLMs Use Cases and the Modern AI Ecosystem.mp4 12.65 MB
  41. ~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/2 -Lab Setup Insecure Ollama API on Azure VM Explained.mp4 12.62 MB
  42. ~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/12 -How Transformers Power Foundation Models and LLMs.mp4 12.14 MB
  43. ~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/1 -Section 5 Introduction LLM API Security & Live Demo Preview.mp4 11.52 MB
  44. ~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/4 -Why Publicly Exposed Systems Face Higher Cybersecurity Risks.mp4 11.41 MB
  45. ~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/6 -Analyzing LLM Attack Surfaces User Organizations vs Model Providers.mp4 10.99 MB
  46. ~Get Your Files Here !/9 - LLM Cybersecurity Summary & Career Tips/7 -Build Your Presence in GenAI Security Branding, Blogging & Research Tips.mp4 10.92 MB
  47. ~Get Your Files Here !/7 - MITRE ATLAS Mapping for LLM Attacks/1 -Introduction to MITRE ATLAS for LLM Security.mp4 10.69 MB
  48. ~Get Your Files Here !/7 - MITRE ATLAS Mapping for LLM Attacks/3 -Wrap-Up MITRE ATLAS in Action + What’s Next in PortSwigger Labs.mp4 10.18 MB
  49. ~Get Your Files Here !/9 - LLM Cybersecurity Summary & Career Tips/4 -Hacking the AI Mindset How to Think Like a LLM Security Expert.mp4 10.14 MB
  50. ~Get Your Files Here !/8 - Hands-On Lab Exploiting AI Decisions in LLM APIs/4 -Section Summary LLM Lab Exploitation Takeaways + What’s Next.mp4 9.62 MB