TorBT - Torrents and Magnet Links Search Engine
[ FreeCourseWeb.com ] Udemy - Pentesting GenAI LLM models - Securing Large Language Models
- Date: 2026-01-25
- Size: 1.6 GB
- Files: 57
File Name
Size
Get Bonus Downloads Here.url
183 B
~Get Your Files Here !/1 - Introduction/1 -Introduction and Course resource.mp4
24 MB
~Get Your Files Here !/1 - Introduction/1 -LLM PENTEST.pptx
11 MB
~Get Your Files Here !/2 - Introduction to LLM Security & Penetration Testing/1 -What is Penetration Testing.mp4
32 MB
~Get Your Files Here !/2 - Introduction to LLM Security & Penetration Testing/2 -Why LLMs Are Vulnerable.mp4
19 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/1 -Why Benchmarks Are Not Enough AI Safety & Security.mp4
14 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/10 -Demo LLM Application Overview.mp4
6.8 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/11 -Importing the LLM Application.mp4
7.3 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/2 -Ai Application vulnerabilities.ipynb
14 kB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/2 -LLM Application Vulnerabilities - Demo 01 (Code Explanation).mp4
22 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/3 -LLM Application Vulnerabilities - Demo 02 (Biased and Stereotypes).mp4
39 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/4 -LLM Application Vulnerabilities - Demo 03 (Sensitive Data Disclosure).mp4
37 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/5 -LLM Application Vulnerabilities - Demo 04 (Service Disruption).mp4
12 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/6 -LLM Application Vulnerabilities - Demo - 05 (Hallucination).mp4
34 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/7 -Foundation Models vs. LLM Apps.mp4
18 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/8 -Strategies for LLM Application Safety.mp4
18 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/9 -Examining LLM Vulnerabilities.mp4
14 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/1 -Why Penetration Testing is Essential for GenAI.mp4
30 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/2 -Comparing Red Teaming and Penetration Testing.mp4
28 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/3 -Penetration Testing Process.mp4
23 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/4 -Exploitation.mp4
20 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/5 -Post-Exploitation.mp4
32 MB
~Get Your Files Here !/5 - Red Teaming for LLMs/1 -Red Teaming LLMs Five Key Techniques.mp4
108 MB
~Get Your Files Here !/6 - Reporting & Mitigation Strategies/1 -Reporting.mp4
10 MB
~Get Your Files Here !/6 - Reporting & Mitigation Strategies/2 -Remediation and Reporting.mp4
27 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/1 -What is ATT&CK.mp4
25 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/10 -Exploring ATT&CK Groups.mp4
20 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/11 -Software in the ATT&CK Framework.mp4
16 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/12 -Campaigns Overview.mp4
22 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/13 -ATT&CK Relationships.mp4
15 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/14 -ATT&CK Enterprise Matrix - Hands-On.mp4
201 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/2 -Understanding the Pyramid of Pain.mp4
56 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/3 -Overview of ATT&CK Matrices.mp4
11 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/4 -ATT&CK Tactics.mp4
74 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/5 -ATT&CK Techniques.mp4
30 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/6 -ATT&CK Subtechniques.mp4
43 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/7 -Data Sources for ATT&CK.mp4
15 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/8 -Detection Strategies.mp4
18 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/9 -Implementing Mitigation Techniques.mp4
20 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/1 -Prompt Injection.mp4
18 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/10 -Plugin Security LLM Applications.mp4
21 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/11 -Excessive Agency.mp4
27 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/12 -Overreliance.mp4
36 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/13 -Model Theft.mp4
16 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/2 -Indirect Prompt Injection Demo.mp4
122 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/2 -Indirect Prompt Injection Lab Access.url
101 B
~Get Your Files Here !/8 - LLM Application Vulnerabilities/3 -Insecure Output Handling Theory.mp4
27 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/4 -Insecure Output Handling Demo.mp4
90 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/4 -Insecure Output Handling Lab Access.url
119 B
~Get Your Files Here !/8 - LLM Application Vulnerabilities/5 -Supply Chain Vulnerabilities.mp4
23 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/6 -Model Denial of Service (DoS).mp4
42 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/7 -Stop Model DOS Attack.mp4
16 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/8 -Training Data Poisoning.mp4
26 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/9 -Sensitive Information Disclosure.mp4
30 MB
~Get Your Files Here !/9 - Conclusion/1 - About your certificate.html
964 B
~Get Your Files Here !/9 - Conclusion/1 - Bonus lecture.html
6.3 kB
~Get Your Files Here !/Bonus Resources.txt
70 B