TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] AI Agents for Cybersecurity (2026)

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/01. Introduction/01. Welcome and course goals.mp4
17 MB
~Get Your Files Here !/01. Introduction/01. Welcome and course goals.srt
5.0 kB
~Get Your Files Here !/02. 1. Introduction to AI and LLMs in Cybersecurity/01. Chapter introduction.mp4
13 MB
~Get Your Files Here !/02. 1. Introduction to AI and LLMs in Cybersecurity/01. Chapter introduction.srt
3.8 kB
~Get Your Files Here !/02. 1. Introduction to AI and LLMs in Cybersecurity/02. The transformative potential of AI and LLMs in cybersecurity.mp4
15 MB
~Get Your Files Here !/02. 1. Introduction to AI and LLMs in Cybersecurity/02. The transformative potential of AI and LLMs in cybersecurity.srt
7.0 kB
~Get Your Files Here !/02. 1. Introduction to AI and LLMs in Cybersecurity/03. Defining large language models (LLMs) and their architectures.mp4
29 MB
~Get Your Files Here !/02. 1. Introduction to AI and LLMs in Cybersecurity/03. Defining large language models (LLMs) and their architectures.srt
13 kB
~Get Your Files Here !/02. 1. Introduction to AI and LLMs in Cybersecurity/04. Evolution of AI in cybersecurity From ML to agentic AI.mp4
16 MB
~Get Your Files Here !/02. 1. Introduction to AI and LLMs in Cybersecurity/04. Evolution of AI in cybersecurity From ML to agentic AI.srt
7.2 kB
~Get Your Files Here !/03. 2. Core Concepts of AI Agents/01. What are AI agents Definition, characteristics, and workflow.mp4
16 MB
~Get Your Files Here !/03. 2. Core Concepts of AI Agents/01. What are AI agents Definition, characteristics, and workflow.srt
6.8 kB
~Get Your Files Here !/03. 2. Core Concepts of AI Agents/02. LLMs as the “brain” of AI agents Capabilities and limitations.mp4
21 MB
~Get Your Files Here !/03. 2. Core Concepts of AI Agents/02. LLMs as the “brain” of AI agents Capabilities and limitations.srt
8.7 kB
~Get Your Files Here !/03. 2. Core Concepts of AI Agents/03. Agent autonomy levels in cybersecurity.mp4
15 MB
~Get Your Files Here !/03. 2. Core Concepts of AI Agents/03. Agent autonomy levels in cybersecurity.srt
7.7 kB
~Get Your Files Here !/03. 2. Core Concepts of AI Agents/04. Multi-agent systems Collaboration and complexity.mp4
12 MB
~Get Your Files Here !/03. 2. Core Concepts of AI Agents/04. Multi-agent systems Collaboration and complexity.srt
6.4 kB
~Get Your Files Here !/03. 2. Core Concepts of AI Agents/05. Memory and learning in AI agents.mp4
13 MB
~Get Your Files Here !/03. 2. Core Concepts of AI Agents/05. Memory and learning in AI agents.srt
6.0 kB
~Get Your Files Here !/03. 2. Core Concepts of AI Agents/06. Adapting LLMs for cybersecurity Fine-tuning, prompt engineering, and augmentation.mp4
15 MB
~Get Your Files Here !/03. 2. Core Concepts of AI Agents/06. Adapting LLMs for cybersecurity Fine-tuning, prompt engineering, and augmentation.srt
7.5 kB
~Get Your Files Here !/04. 3. Datasets and Data Handling for AI Agents in Cybersecurity/01. Types of datasets in LLM for security Code-based, text-based, and combined.mp4
15 MB
~Get Your Files Here !/04. 3. Datasets and Data Handling for AI Agents in Cybersecurity/01. Types of datasets in LLM for security Code-based, text-based, and combined.srt
9.2 kB
~Get Your Files Here !/04. 3. Datasets and Data Handling for AI Agents in Cybersecurity/02. Data pre-processing and representation for cybersecurity AI models.mp4
15 MB
~Get Your Files Here !/04. 3. Datasets and Data Handling for AI Agents in Cybersecurity/02. Data pre-processing and representation for cybersecurity AI models.srt
9.2 kB
~Get Your Files Here !/04. 3. Datasets and Data Handling for AI Agents in Cybersecurity/03. Addressing data scarcity LLMs for data augmentation in cybersecurity.mp4
8.8 MB
~Get Your Files Here !/04. 3. Datasets and Data Handling for AI Agents in Cybersecurity/03. Addressing data scarcity LLMs for data augmentation in cybersecurity.srt
2.5 kB
~Get Your Files Here !/05. 4. AI Agents in Threat Detection/01. Chapter introduction.mp4
12 MB
~Get Your Files Here !/05. 4. AI Agents in Threat Detection/01. Chapter introduction.srt
3.6 kB
~Get Your Files Here !/05. 4. AI Agents in Threat Detection/02. Real-time detection of cyber threats with AI.mp4
15 MB
~Get Your Files Here !/05. 4. AI Agents in Threat Detection/02. Real-time detection of cyber threats with AI.srt
7.3 kB
~Get Your Files Here !/05. 4. AI Agents in Threat Detection/03. Automated vulnerability detection and analysis.mp4
15 MB
~Get Your Files Here !/05. 4. AI Agents in Threat Detection/03. Automated vulnerability detection and analysis.srt
7.1 kB
~Get Your Files Here !/05. 4. AI Agents in Threat Detection/04. Malware analysis and classification with AI agents.mp4
12 MB
~Get Your Files Here !/05. 4. AI Agents in Threat Detection/04. Malware analysis and classification with AI agents.srt
6.9 kB
~Get Your Files Here !/06. 5. AI Agents in Network and Social Engineering Security/01. Network intrusion detection and attack classification.mp4
15 MB
~Get Your Files Here !/06. 5. AI Agents in Network and Social Engineering Security/01. Network intrusion detection and attack classification.srt
6.5 kB
~Get Your Files Here !/06. 5. AI Agents in Network and Social Engineering Security/02. Detecting and defending against phishing attacks and deceptive language.mp4
14 MB
~Get Your Files Here !/06. 5. AI Agents in Network and Social Engineering Security/02. Detecting and defending against phishing attacks and deceptive language.srt
6.1 kB
~Get Your Files Here !/06. 5. AI Agents in Network and Social Engineering Security/03. Leveraging AI for threat intelligence and attack surface management.mp4
14 MB
~Get Your Files Here !/06. 5. AI Agents in Network and Social Engineering Security/03. Leveraging AI for threat intelligence and attack surface management.srt
7.4 kB
~Get Your Files Here !/07. 6. Advanced Analysis Capabilities/01. AI for System Log Analysis and Anomaly Detection.mp4
14 MB
~Get Your Files Here !/07. 6. Advanced Analysis Capabilities/01. AI for System Log Analysis and Anomaly Detection.srt
7.7 kB
~Get Your Files Here !/07. 6. Advanced Analysis Capabilities/02. Reverse Engineering and Binary Analysis with AI Assistance.mp4
13 MB
~Get Your Files Here !/07. 6. Advanced Analysis Capabilities/02. Reverse Engineering and Binary Analysis with AI Assistance.srt
8.3 kB
~Get Your Files Here !/07. 6. Advanced Analysis Capabilities/03. AI for understanding security and privacy policies.mp4
15 MB
~Get Your Files Here !/07. 6. Advanced Analysis Capabilities/03. AI for understanding security and privacy policies.srt
9.0 kB
~Get Your Files Here !/08. 7. AI Agents in Incident Response/01. Chapter introduction.mp4
8.2 MB
~Get Your Files Here !/08. 7. AI Agents in Incident Response/01. Chapter introduction.srt
3.3 kB
~Get Your Files Here !/08. 7. AI Agents in Incident Response/02. Automating vulnerability repair and patch generation.mp4
14 MB
~Get Your Files Here !/08. 7. AI Agents in Incident Response/02. Automating vulnerability repair and patch generation.srt
6.8 kB
~Get Your Files Here !/08. 7. AI Agents in Incident Response/03. Streamlining incident response workflows and playbooks.mp4
14 MB
~Get Your Files Here !/08. 7. AI Agents in Incident Response/03. Streamlining incident response workflows and playbooks.srt
7.2 kB
~Get Your Files Here !/08. 7. AI Agents in Incident Response/04. Post-attack analysis and root cause identification with AI.mp4
13 MB
~Get Your Files Here !/08. 7. AI Agents in Incident Response/04. Post-attack analysis and root cause identification with AI.srt
8.0 kB
~Get Your Files Here !/09. 8. Enhancing Security Operations Centres (SOCs) with Agentic AI/01. AI for proactive defense and threat hunting.mp4
9.1 MB
~Get Your Files Here !/09. 8. Enhancing Security Operations Centres (SOCs) with Agentic AI/01. AI for proactive defense and threat hunting.srt
6.0 kB
~Get Your Files Here !/09. 8. Enhancing Security Operations Centres (SOCs) with Agentic AI/02. AI-powered risk management and predictive analytics.mp4
13 MB
~Get Your Files Here !/09. 8. Enhancing Security Operations Centres (SOCs) with Agentic AI/02. AI-powered risk management and predictive analytics.srt
6.7 kB
~Get Your Files Here !/09. 8. Enhancing Security Operations Centres (SOCs) with Agentic AI/03. Optimizing cybersecurity investments and compliance automation.mp4
14 MB
~Get Your Files Here !/09. 8. Enhancing Security Operations Centres (SOCs) with Agentic AI/03. Optimizing cybersecurity investments and compliance automation.srt
7.9 kB
~Get Your Files Here !/09. 8. Enhancing Security Operations Centres (SOCs) with Agentic AI/04. Adaptive decision-making and continuous learning in SOC agents.mp4
12 MB
~Get Your Files Here !/09. 8. Enhancing Security Operations Centres (SOCs) with Agentic AI/04. Adaptive decision-making and continuous learning in SOC agents.srt
8.2 kB
~Get Your Files Here !/10. 9. Security Risks and Vulnerabilities of AI Agents/01. Chapter introduction.mp4
12 MB
~Get Your Files Here !/10. 9. Security Risks and Vulnerabilities of AI Agents/01. Chapter introduction.srt
3.7 kB
~Get Your Files Here !/10. 9. Security Risks and Vulnerabilities of AI Agents/02. Overview of AI agent security challenges The four knowledge gaps.mp4
16 MB
~Get Your Files Here !/10. 9. Security Risks and Vulnerabilities of AI Agents/02. Overview of AI agent security challenges The four knowledge gaps.srt
7.1 kB
~Get Your Files Here !/10. 9. Security Risks and Vulnerabilities of AI Agents/03. Inherent AI-related vulnerabilities Adversarial AI, data poisoning, and misalignment.mp4
15 MB
~Get Your Files Here !/10. 9. Security Risks and Vulnerabilities of AI Agents/03. Inherent AI-related vulnerabilities Adversarial AI, data poisoning, and misalignment.srt
8.0 kB
~Get Your Files Here !/10. 9. Security Risks and Vulnerabilities of AI Agents/04. Agent-specific threats Prompt injection, jailbreaking, and supply chain vulnerabilities.mp4
10 MB
~Get Your Files Here !/10. 9. Security Risks and Vulnerabilities of AI Agents/04. Agent-specific threats Prompt injection, jailbreaking, and supply chain vulnerabilities.srt
6.8 kB
~Get Your Files Here !/11. 10. Ethical Considerations and Governance Frameworks/01. Challenges in LLM interpretability, trustworthiness, and ethical usage.mp4
7.2 MB
~Get Your Files Here !/11. 10. Ethical Considerations and Governance Frameworks/01. Challenges in LLM interpretability, trustworthiness, and ethical usage.srt
2.7 kB
~Get Your Files Here !/11. 10. Ethical Considerations and Governance Frameworks/02. Addressing bias and fairness in AI agents.mp4
14 MB
~Get Your Files Here !/11. 10. Ethical Considerations and Governance Frameworks/02. Addressing bias and fairness in AI agents.srt
6.7 kB
~Get Your Files Here !/11. 10. Ethical Considerations and Governance Frameworks/03. Designing responsible AI Governance models and human-in-the-loop (HITL).mp4
13 MB
~Get Your Files Here !/11. 10. Ethical Considerations and Governance Frameworks/03. Designing responsible AI Governance models and human-in-the-loop (HITL).srt
6.3 kB
~Get Your Files Here !/12. 11. Future Directions and Advanced Concepts/01. Expanding LLM capabilities and multimodal AI.mp4
16 MB
~Get Your Files Here !/12. 11. Future Directions and Advanced Concepts/01. Expanding LLM capabilities and multimodal AI.srt
6.6 kB
~Get Your Files Here !/12. 11. Future Directions and Advanced Concepts/02. Security for LLMs and proactive self-defense.mp4
17 MB
~Get Your Files Here !/12. 11. Future Directions and Advanced Concepts/02. Security for LLMs and proactive self-defense.srt
6.9 kB
~Get Your Files Here !/12. 11. Future Directions and Advanced Concepts/03. The roadmap for AI agents in cybersecurity Opportunities and future research.mp4
17 MB
~Get Your Files Here !/12. 11. Future Directions and Advanced Concepts/03. The roadmap for AI agents in cybersecurity Opportunities and future research.srt
7.1 kB
~Get Your Files Here !/12. 11. Future Directions and Advanced Concepts/04. Course wrap-up video.mp4
12 MB
~Get Your Files Here !/12. 11. Future Directions and Advanced Concepts/04. Course wrap-up video.srt
2.7 kB
~Get Your Files Here !/Bonus Resources.txt
70 B