TorBT - Torrents and Magnet Links Search Engine
[ WebToolTip.com ] Udemy - OWASP Top 10 for LLM Applications (2025)
- Date: 2026-04-20
- Size: 3.9 GB
- Files: 74
File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Module 1 Introduction to LLM Application Security/1 -Introduction to LLMs and their applications.mp4
53 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Application Security/2 -Overview of security challenges specific to LLM applications.mp4
28 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Application Security/3 -Introduction to the OWASP Top 10 LLM Applications list.mp4
40 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Application Security/4 -Importance of secure LLM development and deployment.mp4
46 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Application Security/5 -Real-world case studies of successfulunsuccessful LLM implementations.mp4
69 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Application Security/6 -Common LLM application architectures (e.g., RAG).mp4
69 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Application Security/7 -The threat landscape motivations of attackers targeting LLM applications.mp4
58 MB
~Get Your Files Here !/10 - Module 10 LLM092025 – Misinformation/1 -The issue of misinformation generated by LLMs.mp4
79 MB
~Get Your Files Here !/10 - Module 10 LLM092025 – Misinformation/2 -Causes and potential impacts of misinformation.mp4
96 MB
~Get Your Files Here !/10 - Module 10 LLM092025 – Misinformation/3 -Prevention and mitigation strategies.mp4
67 MB
~Get Your Files Here !/10 - Module 10 LLM092025 – Misinformation/4 -The spectrum of misinformation.mp4
82 MB
~Get Your Files Here !/10 - Module 10 LLM092025 – Misinformation/5 -Impact on specific domains.mp4
99 MB
~Get Your Files Here !/10 - Module 10 LLM092025 – Misinformation/6 -Detection and mitigation techniques.mp4
113 MB
~Get Your Files Here !/11 - Module 11 LLM102025 – Unbounded Consumption/1 -Risks associated with excessive and uncontrolled LLM usage.mp4
55 MB
~Get Your Files Here !/11 - Module 11 LLM102025 – Unbounded Consumption/2 -Vulnerabilities that can lead to denial of service, economic losses, etc.mp4
60 MB
~Get Your Files Here !/11 - Module 11 LLM102025 – Unbounded Consumption/3 -Prevention and mitigation strategies.mp4
53 MB
~Get Your Files Here !/11 - Module 11 LLM102025 – Unbounded Consumption/4 -Economic denial of service.mp4
42 MB
~Get Your Files Here !/11 - Module 11 LLM102025 – Unbounded Consumption/5 -Rate limiting strategies.mp4
44 MB
~Get Your Files Here !/11 - Module 11 LLM102025 – Unbounded Consumption/6 -Model extraction defenses.mp4
52 MB
~Get Your Files Here !/12 - Module 12 Best Practices and Future Trends in LLM Security/1 -Summary of key security principles for LLM applications.mp4
37 MB
~Get Your Files Here !/12 - Module 12 Best Practices and Future Trends in LLM Security/2 -Emerging trends and future challenges in LLM security.mp4
49 MB
~Get Your Files Here !/12 - Module 12 Best Practices and Future Trends in LLM Security/3 -Resources and further learning.mp4
38 MB
~Get Your Files Here !/12 - Module 12 Best Practices and Future Trends in LLM Security/4 -Secure LLM development lifecycle integrating security into every stage.mp4
46 MB
~Get Your Files Here !/12 - Module 12 Best Practices and Future Trends in LLM Security/5 -Emerging technologies.mp4
57 MB
~Get Your Files Here !/12 - Module 12 Best Practices and Future Trends in LLM Security/6 -The role of standards and regulations.mp4
50 MB
~Get Your Files Here !/2 - Module 2 LLM012025 – Prompt Injection/1 -Detailed explanation of prompt injection vulnerabilities.mp4
42 MB
~Get Your Files Here !/2 - Module 2 LLM012025 – Prompt Injection/2 -Types of prompt injection (direct and indirect).mp4
52 MB
~Get Your Files Here !/2 - Module 2 LLM012025 – Prompt Injection/3 -Potential impacts of prompt injection attacks.mp4
60 MB
~Get Your Files Here !/2 - Module 2 LLM012025 – Prompt Injection/4 -Prevention and mitigation strategies.mp4
59 MB
~Get Your Files Here !/2 - Module 2 LLM012025 – Prompt Injection/5 -Evolution of prompt injection techniques and their increasing sophistication.mp4
53 MB
~Get Your Files Here !/2 - Module 2 LLM012025 – Prompt Injection/6 -Impact deep dive specific examples.mp4
65 MB
~Get Your Files Here !/2 - Module 2 LLM012025 – Prompt Injection/7 -Defense-in-depth combining input validation, output filtering, and human review.mp4
58 MB
~Get Your Files Here !/3 - Module 3 LLM022025 – Sensitive Information Disclosure/1 -Common examples of vulnerabilities(PII leakage, proprietary algorithm exposure.).mp4
79 MB
~Get Your Files Here !/3 - Module 3 LLM022025 – Sensitive Information Disclosure/2 -Understanding the risks of sensitive information disclosure in LLM applications.mp4
102 MB
~Get Your Files Here !/3 - Module 3 LLM022025 – Sensitive Information Disclosure/3 -Prevention and mitigation strategies (sanitization, access controls, etc.).mp4
61 MB
~Get Your Files Here !/3 - Module 3 LLM022025 – Sensitive Information Disclosure/4 -Data minimization importance of minimizing sensitive data collection.mp4
45 MB
~Get Your Files Here !/3 - Module 3 LLM022025 – Sensitive Information Disclosure/5 -Privacy-enhancing technologies - PET.mp4
59 MB
~Get Your Files Here !/3 - Module 3 LLM022025 – Sensitive Information Disclosure/6 -Legal and compliance legal implications of sensitive data disclosure.mp4
69 MB
~Get Your Files Here !/4 - Module 4 LLM032025 – Supply Chain/1 -Supply chain vulnerabilities in LLM development and deployment.mp4
109 MB
~Get Your Files Here !/4 - Module 4 LLM032025 – Supply Chain/2 -Prevention and mitigation strategies for supply chain risks.mp4
50 MB
~Get Your Files Here !/4 - Module 4 LLM032025 – Supply Chain/3 -SBOMs in detail explanation of Software Bill of Materials (SBOMs) and their imp.mp4
52 MB
~Get Your Files Here !/4 - Module 4 LLM032025 – Supply Chain/4 -Model provenance challenges difficulties in verifying the origin and integrity.mp4
46 MB
~Get Your Files Here !/4 - Module 4 LLM032025 – Supply Chain/5 -Governance and policy importance of clear policies for using third-party LLMs.mp4
47 MB
~Get Your Files Here !/5 - Module 5 LLM042025 – Data and Model Poisoning/1 -Understanding data and model poisoning attacks.mp4
29 MB
~Get Your Files Here !/5 - Module 5 LLM042025 – Data and Model Poisoning/2 -How poisoning can impact LLM behavior and security.mp4
45 MB
~Get Your Files Here !/5 - Module 5 LLM042025 – Data and Model Poisoning/3 -Prevention and mitigation strategies.mp4
49 MB
~Get Your Files Here !/5 - Module 5 LLM042025 – Data and Model Poisoning/4 -Poisoning scenarios across the lifecycle poisoning in training and fine-tuning.mp4
48 MB
~Get Your Files Here !/5 - Module 5 LLM042025 – Data and Model Poisoning/5 -Backdoor attacks detail on how backdoors are inserted.mp4
41 MB
~Get Your Files Here !/5 - Module 5 LLM042025 – Data and Model Poisoning/6 -Robustness testing need for rigorous testing to detect poisoning effects.mp4
45 MB
~Get Your Files Here !/6 - Module 6 LLM052025 – Improper Output Handling/1 -Risks associated with improper handling of LLM outputs.mp4
49 MB
~Get Your Files Here !/6 - Module 6 LLM052025 – Improper Output Handling/2 -Vulnerabilities such as XSS, SQL injection, and remote code execution.mp4
42 MB
~Get Your Files Here !/6 - Module 6 LLM052025 – Improper Output Handling/3 -Prevention and mitigation strategies.mp4
46 MB
~Get Your Files Here !/6 - Module 6 LLM052025 – Improper Output Handling/4 -Output encoding examples code examples for different contexts (e.g., HTML, SQL).mp4
42 MB
~Get Your Files Here !/6 - Module 6 LLM052025 – Improper Output Handling/5 -Real-world exploits detail cases where improper output handling led to breaches.mp4
53 MB
~Get Your Files Here !/7 - Module 7 LLM062025 – Excessive Agency/1 -The concept of agency in LLM systems and associated risks.mp4
57 MB
~Get Your Files Here !/7 - Module 7 LLM062025 – Excessive Agency/2 -Risks of excessive functionality, permissions, and autonomy.mp4
53 MB
~Get Your Files Here !/7 - Module 7 LLM062025 – Excessive Agency/3 -Prevention and mitigation strategies.mp4
45 MB
~Get Your Files Here !/7 - Module 7 LLM062025 – Excessive Agency/4 -Agentic systems explanation of LLM agents, their benefits, and risks.mp4
41 MB
~Get Your Files Here !/7 - Module 7 LLM062025 – Excessive Agency/5 -Least privilege in depth detailed guidance on implementing least privilege.mp4
64 MB
~Get Your Files Here !/7 - Module 7 LLM062025 – Excessive Agency/6 -Authorization frameworks best practices for managing authorization in LLM.mp4
45 MB
~Get Your Files Here !/8 - Module 8 LLM072025 – System Prompt Leakage/1 -Vulnerability of system prompt leakage.mp4
34 MB
~Get Your Files Here !/8 - Module 8 LLM072025 – System Prompt Leakage/2 -Risks associated with exposing system prompts.mp4
37 MB
~Get Your Files Here !/8 - Module 8 LLM072025 – System Prompt Leakage/3 -Prevention and mitigation strategies.mp4
44 MB
~Get Your Files Here !/8 - Module 8 LLM072025 – System Prompt Leakage/4 -Prompt engineering risks how prompt engineering can extract system prompts.mp4
41 MB
~Get Your Files Here !/8 - Module 8 LLM072025 – System Prompt Leakage/5 -Defense in depth for prompts.mp4
55 MB
~Get Your Files Here !/8 - Module 8 LLM072025 – System Prompt Leakage/6 -Secure design principles.mp4
52 MB
~Get Your Files Here !/9 - Module 9 LLM082025 – Vector and Embedding Weaknesses/1 -Vulnerabilities related to vector and embedding usage in LLM applications.mp4
44 MB
~Get Your Files Here !/9 - Module 9 LLM082025 – Vector and Embedding Weaknesses/2 -Risks of unauthorized access, data leakage, and poisoning.mp4
53 MB
~Get Your Files Here !/9 - Module 9 LLM082025 – Vector and Embedding Weaknesses/3 -Prevention and mitigation strategies.mp4
48 MB
~Get Your Files Here !/9 - Module 9 LLM082025 – Vector and Embedding Weaknesses/4 -Embedding security details on securing vector databases and embeddings.mp4
48 MB
~Get Your Files Here !/9 - Module 9 LLM082025 – Vector and Embedding Weaknesses/5 -RAG security best practices.mp4
58 MB
~Get Your Files Here !/9 - Module 9 LLM082025 – Vector and Embedding Weaknesses/6 -Emerging research.mp4
58 MB
~Get Your Files Here !/Bonus Resources.txt
70 B