How to use AI and LLMs for Offensive and Defensive Security - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: How to use AI and LLMs for Offensive and Defensive Security (/Thread-How-to-use-AI-and-LLMs-for-Offensive-and-Defensive-Security) |
How to use AI and LLMs for Offensive and Defensive Security - OneDDL - 11-22-2024 Free Download How to use AI and LLMs for Offensive and Defensive Security Published 11/2024 Created by Martin Voelk MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 23 Lectures ( 3h 46m ) | Size: 2.45 GB Learn how to leverage AI/LLMs for your day-to-day job in both offensive and defensive security. Be ahead of the curve! What you'll learn Models / UIs and local setup Most common LLM Models Privacy RAG (Retrieval Augmented Generation) Front Ends (Open WebUI, jan ai, lmstudio etc.) Ollama Huggingface Prompting and Prompt Engineering Zero-shot, few-shot, Chain of Thought System Prompts Make your own bots Prompt leakage Jailbreaking Troubleshooting API usage Yolo tool Fabric tool LLM CLI Using AI/LLM for Offensive Security Using AI/LLM for Defensive Security Requirements Basic IT Skills Basic understanding of web technology No programming or hacking knowledge required Computer with a minimum of 8GB ram/memory Operating System: Windows / Apple Mac OS / Linux Reliable internet connection Any Webbrowser Description How to leverage AI and LLMs for both offensive and defensive SecurityYour instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.This course has a both theory and practical lab sections The videos are easy to follow along and replicate. The course features the following:AI/LLM IntroductionModels / UIs and local setupMost common LLM ModelsPrivacy RAG (Retrieval Augmented Generation)Front Ends (Open WebUI, jan ai, lmstudio etc.)Ollama Huggingface PromptingBasicsPrompt EngineeringZero-shot, few-shot, Chain of ThoughtSystem PromptsMake your own bots Prompt leakage Jailbreaking TroubleshootingAPI usageToolsYoloFabric LLM CLIUsing AI/LLM for Offensive SecurityCreate Pentest bots and examplesCreate Redteam bots and examplesHDI attack generationC&C attack generation Using AI/LLM for Defensive SecurityCreate Blue Team bots and examplesIncident Response botTool support companion bots Code analysis bots Notes & DisclaimerThis course is for educational purposes only. This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack. Who this course is for Anybody interested in how to use AI/LLM for Offensive Security Anybody interested in how to use AI/LLM for Defensive Security Penetration Testers & Red Teamers Security Engineers & Blue Teamers Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live No Password - Links are Interchangeable |