Companies Home Search Profile

Ethical Hacking Gen AI/LLM/Chatbot Complete Hands on

Focused View

Dr.SecurityGuru .,Altamash BM

2:04:26

0 View
  • 1. Course Introduction.mp4
    00:54
  • 2. Teaser.mp4
    08:19
  • 3. Course Content.mp4
    08:19
  • 1.1 01 AI Fundamental.pdf
  • 1. What Is AI, LLM and Gen AI.mp4
    01:50
  • 2. Understand AI And Its Benefits.mp4
    01:16
  • 3. Unserstand Gen AI And Its Benefits.mp4
    01:43
  • 4. What Is Prompt And How It Works.mp4
    01:54
  • 1. Prompt Injection.mp4
    01:45
  • 2. How Prompt Injection Occurs.mp4
    01:46
  • 3. Prompt Injection Types.mp4
    01:00
  • 4. Understand Prompt Injection - Infographics.mp4
    01:12
  • 5.1 02 OWASP LLM TOP 10.pdf
  • 5. How To Prevent Prompt Injection.mp4
    01:29
  • 6. Prompt Injection Lab1.mp4
    02:27
  • 7. Prompt Injection Lab2.mp4
    02:09
  • 8. Prompt Injection Lab3.mp4
    04:07
  • 1. Insecure Output Handling.mp4
    01:04
  • 2. How Insecure Output Handling Occurs.mp4
    01:45
  • 3. Understand Insecure Output Handling - Infographics.mp4
    00:38
  • 4. How To Prevent Insecure Output Handling.mp4
    01:28
  • 5. Insecure Output Handling - Lab.mp4
    01:43
  • 1. Training Data Poisoning.mp4
    01:50
  • 2. How Training Data Poisoning Occurs.mp4
    01:29
  • 3. Unserstand Training Data Poisoning - Infographics.mp4
    01:42
  • 4. How To Prevent Training Data Poisoning.mp4
    01:28
  • 5. Training Data Poisoning - Lab.mp4
    02:15
  • 1. Model Denial Of Service.mp4
    01:20
  • 2. How Model Denial Of Service Occurs.mp4
    02:02
  • 3. Understand Model Denial Of Service - Infographics.mp4
    01:04
  • 4. How To Prevent Model Denial Of Service.mp4
    02:19
  • 5. Model Denial Of Service - Lab.mp4
    02:59
  • 1. Supply Chain Vulnerabilities.mp4
    01:36
  • 2. How Supply Chain Vulnerabilities Occurs.mp4
    02:13
  • 3. Understand Supply Chain Vulnerabilities - Infographics.mp4
    00:58
  • 4. How To Prevent Supply Chain Vulnerabilities.mp4
    02:26
  • 5. Supply Chain Vulnerabilities - Lab.mp4
    02:55
  • 1. Sensitive Information Disclosure.mp4
    02:05
  • 2. How Sensitive Information Disclosure Occurs.mp4
    01:27
  • 3. Understand Sensitive Information Disclosure - Infographics.mp4
    01:38
  • 4. How To Prevent Sensitive Information Disclosure.mp4
    02:10
  • 5. Sensitive Information Disclosure - Lab.mp4
    02:30
  • 1. Insecure Plugin Design.mp4
    01:40
  • 2. How Insecure Plugin Design Occurs.mp4
    01:48
  • 3. Understnad Insecure Plugin Design - Infographics.mp4
    01:16
  • 4. How To Prevent Insecure Plugin Design.mp4
    02:00
  • 5. Insecure Plugin Design - Lab.mp4
    01:27
  • 1. Excessive Agency.mp4
    02:00
  • 2. How Excessive Agency Occurs.mp4
    01:46
  • 3. Understand Excessive Agency - Infographics.mp4
    01:13
  • 4. How To Precent Excessive Agency.mp4
    02:25
  • 5. Excessive Agency - Lab.mp4
    03:00
  • 1. Overreliance (Hallucination).mp4
    01:53
  • 2. How Overreliance (Hallucination) Occurs.mp4
    01:43
  • 3. Understand Overreliance (Hallucination) - Infographics.mp4
    01:14
  • 4. How To Prevent Overreliance (Hallucination).mp4
    01:56
  • 5. Overreliance (Hallucination) - Lab.mp4
    02:33
  • 1. Model Theft.mp4
    01:34
  • 2. How Model Theft Occurs.mp4
    01:41
  • 3. Understand Model Theft - Infographics.mp4
    01:30
  • 4. How To Prevent Model Theft.mp4
    02:08
  • 5. Model Theft - Lab.mp4
    02:18
  • 1. Whats Next.mp4
    02:07
  • Description


    Learn AI Fundamentals, OWASP Top10 LLM, Real-World Attack Case Studies, Mitigations And Hacking Labs

    What You'll Learn?


    • Learn AI/ML/Chatbot hacking quickly
    • Spot weaknesses in AI chatbots and learn by ethical hacking approach
    • Engage in practical AI chatbot hacking labs and case studies
    • Explore AI attack prevention methods
    • Connect theory with practice in AI hacking
    • Equip yourself to counter AI threat
    • Gain expertise in OWASP Top 10 LLM vulnerabilities

    Who is this for?


  • Cyber security Professional, Software engineer, Penetration tester, Bug bounty hunter
  • What You Need to Know?


  • No experience needed. You will learn everything you need to know.
  • More details


    Description

    Introducing our comprehensive Ethical Hacking Gen AI/LLM/Chatbot Complete Hands-On”.

    In this course you will be exploring the fundamental principles of AI before advancing to hacking AI/LLM chatbots. To enrich the learning experience, we’ve integrated lab exercises with hacking demos. We are dedicated to guiding you throughout this journey by providing lifetime access to our Discord channel. Here, you can participate in discussions and seek assistance from both us and your fellow learners. Learning becomes more enjoyable when you are part of a supportive community.


    Why choose this AI Security course?

    Whether you're a seasoned cybersecurity enthusiast or just starting out in the field, this course is designed to equip you with the knowledge and skills needed to excel in the emerging AI Security field. Here's what you can expect from our AI Security training:

    • Master the fundamentals of AI and its intersection with cybersecurity.

    • Identify vulnerabilities in AI chatbots and understand OWASP Top 10 LLM vulnerabilities.

    • Engage in hands-on hacking labs specifically tailored for AI/LLM chatbots.

    • Learn AI hacking techniques through immersive real-world scenarios and cae studies.

    • Explore effective AI Attack Mitigation Strategies to safeguard against threats.

    • Bridge the gap between theory and practice in AI hacking, empowering yourself to defend against AI-based vulnerabilities.

    • Equip yourself with the skills needed to pursue a career in AI security.


    Our course is designed to bridge the gap between theory and practical experience in AI Security through hacking lab exercises. By the end of this bootcamp, you will not only be equipped with the knowledge and skills to defend against AI-based threats but also empowered to pursue a rewarding career in AI security.

    What you’ll learn

    • Learn AI/LLM/Chatbots hacking

    • Understand the fundamentals of AI

    • Identify vulnerabilities in AI chatbot

    • Hands-on AI chatbot hacking labs

    • AI Attack Mitigation Strategies

    • Maximize learning in minimal time

    • Bridge the gap between theory and practice in AI hacking

    • Empower Yourself to Defend Against AI-Based Threats

    • Expertise in OWASP Top 10 LLM vulnerabilities

    • Prepare for a career in AI security

    Are there any course requirements or prerequisites?

    • No prerequisites required

    • Beginner-friendly

    Who this course is for:

    • Anyone interested in AI Security

    • Security Leaders

    • Career Seekers in Security

    • Machine Learning Developer

    • Data Scientist/Data Engineer

    • Security Engineer

    • GenAI Developer - LLM

    • Aspiring AI/Generative AI Enthusiast


    Who this course is for:

    • Cyber security Professional, Software engineer, Penetration tester, Bug bounty hunter

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dr.SecurityGuru .
    Dr.SecurityGuru .
    Instructor's Courses
    With over 10+ years of experience in penetration testing and security research, We are specialize in AI/ML/Chatbot security testing, as well as web, API, and thick client applications.As a bug bounty hunter, we have helped secure the internet by reporting vulnerabilities to companies like Google and ChatGPT. Additionally, We assist students in entering the cybersecurity field by providing online training and mentoring.
    With over 5 years of experience in Cybersecurity and Artificial Intelligence, I bring a wealth of knowledge and expertise to the field of AI and Large Language Models (LLM). My professional journey encompasses a broad range of skills and experiences in Application Security, Full Stack Development, Network Security, Automation, Open Source Intelligence, Application Architecture Review, Secure Software Development Life Cycle, and Secure Code Review.I have a comprehensive understanding of information security strategy, risk assessments, security architecture, and governance. My experience includes strategic outsourcing & co-sourcing, penetration testing (Web & Infrastructure), network audits, source code reviews, malware analysis, and threat management. My proficiency extends to Web Penetration Testing, VAPT, Microsoft Azure Cloud, AWS, API Development, API Penetration Testing, Mobile Penetration Testing, and Source Code Review.My capability to analyze and interpret unique problems, combined with my training experience and logical thinking, enables me to find and implement effective solutions. Join me in this Udemy course to explore the fascinating world of AI and LLM, where you will gain valuable insights and hands-on experience from a seasoned expert in the field.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 61
    • duration 2:04:26
    • Release Date 2024/10/15