TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] Udemy - Intro to LLM Security - OWASP Top 10 for Large Language Mode

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/1 - Introduction.mp4
24 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/2 - Content Download - Download Course Content.url
75 B
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/2 - Content Download.mp4
2.0 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/2 -Download Course Content.url
75 B
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/3 - Module One Overview.mp4
6.0 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/4 - The Rise of LLMs and New Attack Surfaces.mp4
62 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/5 - What is the OWASP Top 10 for LLM Applications.mp4
89 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/6 - Prioritizing Risk Prevalence, Exploitability, and Impact.mp4
38 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/7 - Secure Development Lifecycle (SDLC) for LLM Applications.mp4
54 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/8 - Whiteboard Solution - Analyze and mitigate risk in your LLM applications.mp4
86 MB
~Get Your Files Here !/1 - Module 1 Introduction to LLM Security and the OWASP Top 10/9 - Module Review Summary.mp4
12 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/1 - Module Two Overview.mp4
14 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/2 - Understanding IO Vulnerabilities.mp4
24 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/3 - LLM01 Prompt Injection (The #1 Risk).mp4
55 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/4 - LLM05 Improper Output Handling.mp4
38 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/5 - LLM07 System Prompt Leakage.mp4
56 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/6 - Whiteboard - Prompt Injection Scenario.mp4
28 MB
~Get Your Files Here !/2 - Module 2 The Critical Input and Output Vulnerabilities/7 - Module Review Summary.mp4
18 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/1 - Module Three Overview.mp4
8.8 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/2 - Understanding Data, Model and Supply Chain Risks.mp4
25 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/3 - LLM02 Sensitive Information Disclosure.mp4
48 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/4 - LLM04 Data and Model Poisoning.mp4
27 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/5 - LLM03 Supply Chain Vulnerabilities.mp4
54 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/6 - Whiteboard Solution - Supply Chains.mp4
67 MB
~Get Your Files Here !/3 - Module 3 Data, Model, and Supply Chain Risks/7 - Module Review Summary.mp4
9.6 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/1 - Module Four Overview.mp4
6.1 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/2 - Understanding Runtime, Control and Operational Issues.mp4
15 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/3 - LLM06 Excessive Agency.mp4
30 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/4 - LLM09 Misinformation and Overreliance.mp4
22 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/5 - LLM10 Unbounded Consumption.mp4
48 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/6 - LLM08 Vector and Embedding Weaknesses.mp4
26 MB
~Get Your Files Here !/4 - Module 4 Runtime, Control, and Operational Issues/7 - Module Review Summary.mp4
25 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/1 - Module Five Overview.mp4
7.4 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/10 - Resources and Closeout.mp4
15 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/2 - Defense in Depth.mp4
60 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/3 - Risk Management.mp4
43 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/4 - AI Lifecycle.mp4
33 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/5 - NIST AI Lifecycle.mp4
56 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/6 - LLM Security Testing.mp4
41 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/7 - Operational Security for AIML.mp4
36 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/8 - The Future of LLM Security and Emerging Threats.mp4
23 MB
~Get Your Files Here !/5 - Module 5 Risk Management and Operational Security/9 - Module Review Summary.mp4
15 MB
~Get Your Files Here !/Bonus Resources.txt
70 B