Udemy AI Security - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Udemy AI Security (/Thread-Udemy-AI-Security) |
Udemy AI Security - AD-TEAM - 12-08-2024 3.37 GB | 14min 42s | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English
Files Included :
1 -Introduction.mp4 (18.16 MB) 1 -What is a Vulnerability.mp4 (7.28 MB) 2 -Common Vulnerabilities and Exposures (CVE).mp4 (12.47 MB) 3 -Common Vulnerability Scoring System (CVSS).mp4 (25.79 MB) 4 -Log4Shell.mp4 (19.48 MB) 5 -Demo Analyzing an Exploit - Log4Shell.mp4 (29.32 MB) 6 -Heartbleed.mp4 (16.86 MB) 7 -Demo Analyzing an Exploit - Heartbleed.mp4 (19.16 MB) 8 -EternalBlue.mp4 (18.85 MB) 9 -Demo Analyzing an Exploit - EternalBlue.mp4 (21.84 MB) 1 -Demo SQL Injection.mp4 (37.83 MB) 2 -Demo Cross-Site-Scripting (XSS).mp4 (32.44 MB) 1 -What is Copilot for Security.mp4 (20.13 MB) 10 -Demo Create Compute Capacities.mp4 (18.63 MB) 11 -Demo Setup Copilot for Security.mp4 (86.08 MB) 12 -Creating Effective Prompts.mp4 (70.62 MB) 13 -Demo Prompt Usage Monitoring.mp4 (3.28 MB) 14 -Demo Incident Investigation Promptbook.mp4 (92.28 MB) 15 -Demo Suspicious Script Analysis Promptbook.mp4 (105.05 MB) 16 -Demo Threat Actor Profile Promptbook.mp4 (99.35 MB) 17 -Demo Vulnerability Impact Assessment Promptbook.mp4 (64.13 MB) 18 -Demo CTI Prompts.mp4 (122.37 MB) 19 -Demo Vulnerability Assessment Prompts.mp4 (64.15 MB) 2 -From Prompt to Reponse.mp4 (8.06 MB) 3 -Architecture.mp4 (22.73 MB) 4 -Extending Copilot with Plugins & more.mp4 (13.88 MB) 5 -Privacy Implications.mp4 (7.76 MB) 6 -Authentication & RBAC.mp4 (28.8 MB) 7 -Standalone vs Embedded Experience.mp4 (6.34 MB) 8 -Pricing.mp4 (10.06 MB) 9 -Onboarding Requirements.mp4 (3.72 MB) 1 -What is Penetration Testing.mp4 (8.69 MB) 10 -Exploitation.mp4 (4.16 MB) 11 -Post Exploitation.mp4 (7.63 MB) 12 -Reporting.mp4 (5.3 MB) 13 -Remediation & Lessons Learned.mp4 (6.64 MB) 2 -Penetration Testing in Cyber Security.mp4 (8.21 MB) 3 -Red Teaming vs Penetration Testing.mp4 (18.82 MB) 4 -The Importance of Penetration Testing for GenAI.mp4 (5.31 MB) 5 -Overview.mp4 (3.66 MB) 6 -Planning and Preparation.mp4 (8.17 MB) 7 -Reconnaissance.mp4 (6.78 MB) 8 -Scanning & Enumeration.mp4 (3.43 MB) 9 -Vulnerability Assessment.mp4 (8.02 MB) 1 -What is ATT&CK.mp4 (13.5 MB) 10 -Mitigations.mp4 (13.22 MB) 11 -Groups.mp4 (10.78 MB) 12 -Software.mp4 (6.63 MB) 13 -Campaigns.mp4 (24.66 MB) 14 -Relations.mp4 (6.16 MB) 15 -Demo Enterprise Matrix.mp4 (151.76 MB) 16 -What is MITRE ATLAS.mp4 (3.85 MB) 17 -Mapping ATLAS to the Pyramid of Pain.mp4 (4.08 MB) 18 -Tactics.mp4 (6.92 MB) 19 -Techniques.mp4 (9.48 MB) 2 -Mapping ATT&CK to the Pyramid of Pain.mp4 (10.22 MB) 20 -Subtechniques.mp4 (5.96 MB) 21 -Tactics, Techniques, Subtechniques.mp4 (2.9 MB) 22 -Mitigations.mp4 (10.7 MB) 23 -Case Studies.mp4 (8.84 MB) 24 -Case Study I Microsoft Azure Service Disruption.mp4 (7.47 MB) 25 -Case Study II PoisonGPT.mp4 (7.1 MB) 26 -Case Study III ChatGPT Plugin Privacy Leak.mp4 (7.18 MB) 27 -Demo ATLAS Matrix.mp4 (22.94 MB) 3 -Matrices.mp4 (6.27 MB) 4 -Tactics.mp4 (32.26 MB) 5 -Techniques.mp4 (17.91 MB) 6 -Subtechniques.mp4 (28.16 MB) 7 -Tactics, Techniques & Subtechniques.mp4 (6.05 MB) 8 -Data Sources.mp4 (5.67 MB) 9 -Detections.mp4 (6.41 MB) 1 -What is Corporate Governance.mp4 (7.55 MB) 10 -Enhance Monitoring and Feedback Mechanisms.mp4 (8.46 MB) 11 -Define Data and Identity Governance.mp4 (9.25 MB) 12 -Continuous Improvement and Adaptation.mp4 (6.53 MB) 2 -What is Enterprise Risk Management.mp4 (16.48 MB) 3 -What is Cyber Security Risk Management.mp4 (18.28 MB) 4 -Scenario.mp4 (2.14 MB) 5 -Establish a GenAI Governance Committee.mp4 (7.83 MB) 6 -Develop Comprehensive Governance Policies and Guidelines.mp4 (7.45 MB) 7 -Implement Risk Management Practices.mp4 (9.45 MB) 8 -Training and User Awareness Programs.mp4 (9.08 MB) 9 -Adopt AI Ethics and Standards Frameworks.mp4 (6.65 MB) 1 -Cloud Computing Properties.mp4 (18.12 MB) 10 -What is CSPM.mp4 (6.75 MB) 11 -CSPM Plans.mp4 (11.09 MB) 12 -Demo Enable Defender CSPM.mp4 (27.8 MB) 13 -Defender for Cloud RBAC.mp4 (9.23 MB) 14 -Security Recommendations.mp4 (4.88 MB) 15 -Demo Security Recommendations.mp4 (19.67 MB) 16 -Microsoft Cloud Security Benchmark.mp4 (5.56 MB) 17 -Demo Microsoft Cloud Security Benchmark.mp4 (23.91 MB) 18 -Attack Paths.mp4 (6.35 MB) 19 -Demo Defender CSPM for AI.mp4 (24.06 MB) 2 -Cloud Computing Types.mp4 (11.09 MB) 3 -Azure Global Backbone.mp4 (21.31 MB) 4 -Shared Responsibility Model.mp4 (19.67 MB) 5 -Azure Resource Hierarchy.mp4 (10.28 MB) 6 -Azure Subscription Types.mp4 (10.14 MB) 7 -Entra ID Tenants and Azure Subscriptions.mp4 (7.1 MB) 8 -What is Microsoft Defender for Cloud.mp4 (13.07 MB) 9 -CSPM & CWP.mp4 (10.01 MB) 1 -Bonus.mp4 (19.96 MB) 1 -What is GenAI.mp4 (5.94 MB) 2 -What is a Large Language Model (LLM).mp4 (9.2 MB) 3 -What is a Prompt.mp4 (22.57 MB) 4 -AI Models.mp4 (5.12 MB) 5 -LLM Architecture.mp4 (16.29 MB) 1 -The Importance of Security in GenAI.mp4 (25.65 MB) 2 -Threat Vectors for a GenAI Application.mp4 (15.73 MB) 3 -How Adversaries Leverage AI.mp4 (15.87 MB) 4 -Shared Responsibility in AI.mp4 (21.3 MB) 5 -Microsoft Responsible AI.mp4 (12.22 MB) 1 -Demo Create your OpenAI Account.mp4 (2.4 MB) 2 -Demo Create your Portswigger Account.mp4 (11.04 MB) 3 -Demo Create your Azure Subscription.mp4 (6.52 MB) 1 -What is OWASP.mp4 (5.12 MB) 10 -Countermeasures.mp4 (5.14 MB) 11 -LLM03 Training Data Poisoning.mp4 (13.62 MB) 12 -Countermeasures.mp4 (4.94 MB) 13 -LLM04 Model Denial of Service.mp4 (18.4 MB) 14 -Countermeasures.mp4 (5.04 MB) 15 -LLM05 Supply Chain Vulnerabilities.mp4 (13.67 MB) 16 -Demo LLM05 Supply Chain Vulnerabilities.mp4 (53.55 MB) 17 -Countermeasures.mp4 (8.15 MB) 18 -LLM06 Sensitive Information Disclosure.mp4 (20.23 MB) 19 -Countermeasures.mp4 (2.7 MB) 2 -OWASP Top 10 - Web Application Security Risks.mp4 (20.56 MB) 20 -LLM07 Insecure Plugin Design.mp4 (12.67 MB) 21 -Countermeasures.mp4 (12.27 MB) 22 -LLM08 Excessive Agency.mp4 (11.01 MB) 23 -Demo LLM08 Excessive Agency.mp4 (21.2 MB) 24 -Countermeasures.mp4 (7.51 MB) 25 -LLM09 Overreliance.mp4 (14.29 MB) 26 -Countermeasures.mp4 (4.61 MB) 27 -LLM10 Model Theft.mp4 (8.33 MB) 28 -Countermeasures.mp4 (6.39 MB) 3 -OWASP Top 10 - API Security Risks.mp4 (34.06 MB) 4 -OWASP Top 10 - LLM Security Risks.mp4 (22.55 MB) 5 -LLM01 Prompt Injection.mp4 (15.14 MB) 6 -Demo LLM01 Prompt Injection.mp4 (96.69 MB) 7 -Countermeasures.mp4 (8.25 MB) 8 -LLM02 Insecure Output Handling.mp4 (10.34 MB) 9 -Demo LLM02 Insecure Output Handling.mp4 (83.13 MB) 1 -Inherent LLM Risks.mp4 (16.44 MB) 2 -Transparency & Accountability.mp4 (17.43 MB) 3 -Regulatory Compliance.mp4 (12.61 MB) 4 -Hallucinations.mp4 (10.1 MB) 5 -Bias and Discrimination.mp4 (10.5 MB) 6 -Copyright Infringement and Violation of Intellectual Property.mp4 (12.4 MB) 1 -What is a Threat.mp4 (7.29 MB) 10 -A GenAI Security Architecture.mp4 (11.89 MB) 2 -Threat, Vulnerability & Risk.mp4 (5.58 MB) 3 -What is Threat Modeling.mp4 (6 MB) 4 -Involved Organizations.mp4 (18.24 MB) 5 -Scope Definition.mp4 (6.28 MB) 6 -Threat Identification.mp4 (8.09 MB) 7 -Vulnerability Analysis.mp4 (6.03 MB) 8 -Mitigation Strategy Development.mp4 (5.98 MB) 9 -Documentation and Evolution.mp4 (6.19 MB) 1 -What is a SOC.mp4 (17.89 MB) 10 -Demo Decoding and analyzing base64 reverse shell.mp4 (37.34 MB) 11 -Demo Create an Incident Response Playbook.mp4 (50.06 MB) 2 -SOC Tier Model.mp4 (14.19 MB) 3 -Cyber Security Incident Response Process.mp4 (10.67 MB) 4 -EDR, XDR, SIEM & SOAR.mp4 (22.29 MB) 5 -Demo Data Sources for a SIEM.mp4 (23.27 MB) 6 -Demo Use Cases for a SIEM.mp4 (46.94 MB) 7 -Demo Data Sources for Microsoft Sentinel.mp4 (43.7 MB) 8 -Demo Analytic Rules for Microsoft Sentinel.mp4 (24.36 MB) 9 -Demo Generating YARA Rules.mp4 (39.29 MB) 1 -Intelligence, Threat Intelligence & Cyber Threat Intelligence (CTI).mp4 (9.12 MB) 10 -Demo Assist with IOCs.mp4 (45.3 MB) 11 -Demo Generate Threat Hunting Queries in KQL.mp4 (49.07 MB) 2 -What is CTI.mp4 (10.78 MB) 3 -Threat, Vulnerability & Risk.mp4 (5.58 MB) 4 -Threat-Informed Defense.mp4 (11.61 MB) 5 -Tactics, Techniques & Procedures (TTPs).mp4 (16.51 MB) 6 -IOCs & IOAs.mp4 (14.09 MB) 7 -Pyramid of Pain.mp4 (13.08 MB) 8 -CTI Sources.mp4 (7.66 MB) 9 -Demo Describe CTI.mp4 (40.19 MB)] Screenshot |