Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
How to use AI and LLMs for Offensive and Defensive Security
#1
Video 
[Image: 79de75df7e1787ff47de5a0319ff99a4.jpeg]
Free Download How to use AI and LLMs for Offensive and Defensive Security
Published 11/2024
Created by Martin Voelk
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 23 Lectures ( 3h 46m ) | Size: 2.45 GB

Learn how to leverage AI/LLMs for your day-to-day job in both offensive and defensive security. Be ahead of the curve!
What you'll learn
Models / UIs and local setup
Most common LLM Models
Privacy
RAG (Retrieval Augmented Generation)
Front Ends (Open WebUI, jan ai, lmstudio etc.)
Ollama
Huggingface
Prompting and Prompt Engineering
Zero-shot, few-shot, Chain of Thought
System Prompts
Make your own bots
Prompt leakage
Jailbreaking
Troubleshooting
API usage
Yolo tool
Fabric tool
LLM CLI
Using AI/LLM for Offensive Security
Using AI/LLM for Defensive Security
Requirements
Basic IT Skills
Basic understanding of web technology
No programming or hacking knowledge required
Computer with a minimum of 8GB ram/memory
Operating System: Windows / Apple Mac OS / Linux
Reliable internet connection
Any Webbrowser
Description
How to leverage AI and LLMs for both offensive and defensive SecurityYour instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.This course has a both theory and practical lab sections The videos are easy to follow along and replicate. The course features the following:AI/LLM IntroductionModels / UIs and local setupMost common LLM ModelsPrivacy RAG (Retrieval Augmented Generation)Front Ends (Open WebUI, jan ai, lmstudio etc.)Ollama Huggingface PromptingBasicsPrompt EngineeringZero-shot, few-shot, Chain of ThoughtSystem PromptsMake your own bots Prompt leakage Jailbreaking TroubleshootingAPI usageToolsYoloFabric LLM CLIUsing AI/LLM for Offensive SecurityCreate Pentest bots and examplesCreate Redteam bots and examplesHDI attack generationC&C attack generation Using AI/LLM for Defensive SecurityCreate Blue Team bots and examplesIncident Response botTool support companion bots Code analysis bots Notes & DisclaimerThis course is for educational purposes only. This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack.
Who this course is for
Anybody interested in how to use AI/LLM for Offensive Security
Anybody interested in how to use AI/LLM for Defensive Security
Penetration Testers & Red Teamers
Security Engineers & Blue Teamers
Homepage

[To see links please register or login]




Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live

[To see links please register or login]

No Password - Links are Interchangeable
[Image: signature.png]
Reply


Download Now



Forum Jump:


Users browsing this thread:
2 Guest(s)

Download Now