How to use AI and LLMs for Offensive and Defensive Security
Free Download How to use AI and LLMs for Offensive and Defensive Security
Published 11/2024
Created by Martin Voelk
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 23 Lectures ( 3h 46m ) | Size: 2.45 GB
Learn how to leverage AI/LLMs for your day-to-day job in both offensive and defensive security. Be ahead of the curve!
What you'll learn
Models / UIs and local setup
Most common LLM Models
Privacy
RAG (Retrieval Augmented Generation)
Front Ends (Open WebUI, jan ai, lmstudio etc.)
Ollama
Huggingface
Prompting and Prompt Engineering
Zero-shot, few-shot, Chain of Thought
System Prompts
Make your own bots
Prompt leakage
Jailbreaking
Troubleshooting
API usage
Yolo tool
Fabric tool
LLM CLI
Using AI/LLM for Offensive Security
Using AI/LLM for Defensive Security
Requirements
Basic IT Skills
Basic understanding of web technology
No programming or hacking knowledge required
Computer with a minimum of 8GB ram/memory
Operating System: Windows / Apple Mac OS / Linux
Reliable internet connection
Any Webbrowser
Description
How to leverage AI and LLMs for both offensive and defensive SecurityYour instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.This course has a both theory and practical lab sections The videos are easy to follow along and replicate. The course features the following:AI/LLM IntroductionModels / UIs and local setupMost common LLM ModelsPrivacy RAG (Retrieval Augmented Generation)Front Ends (Open WebUI, jan ai, lmstudio etc.)Ollama Huggingface PromptingBasicsPrompt EngineeringZero-shot, few-shot, Chain of ThoughtSystem PromptsMake your own bots Prompt leakage Jailbreaking TroubleshootingAPI usageToolsYoloFabric LLM CLIUsing AI/LLM for Offensive SecurityCreate Pentest bots and examplesCreate Redteam bots and examplesHDI attack generationC&C attack generation Using AI/LLM for Defensive SecurityCreate Blue Team bots and examplesIncident Response botTool support companion bots Code analysis bots Notes & DisclaimerThis course is for educational purposes only. This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack.
Who this course is for
Anybody interested in how to use AI/LLM for Offensive Security
Anybody interested in how to use AI/LLM for Defensive Security
Penetration Testers & Red Teamers
Security Engineers & Blue Teamers
Homepage
https://www.udemy.com/course/how-to-use-ai-and-llms-for-offensive-and-defensive-security/
Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me
Rapidgator
xurgm.How.to.use.AI.and.LLMs.for.Offensive.and.Defensive.Security.part1.rar.html
xurgm.How.to.use.AI.and.LLMs.for.Offensive.and.Defensive.Security.part3.rar.html
xurgm.How.to.use.AI.and.LLMs.for.Offensive.and.Defensive.Security.part2.rar.html
Fikper
xurgm.How.to.use.AI.and.LLMs.for.Offensive.and.Defensive.Security.part3.rar.html
xurgm.How.to.use.AI.and.LLMs.for.Offensive.and.Defensive.Security.part1.rar.html
xurgm.How.to.use.AI.and.LLMs.for.Offensive.and.Defensive.Security.part2.rar.html
How to use AI and LLMs for Offensive and Defensive Security Torrent Download , How to use AI and LLMs for Offensive and Defensive Security Watch Free Online , How to use AI and LLMs for Offensive and Defensive Security Download Online
Free Download How to use AI and LLMs for Offensive and Defensive Security is known for its high-speed downloads. It uses multiple file hosting services such as Rapidgator.net, Nitroflare.com, Uploadgig.com, and Mediafire.com to host its files