MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

[ WebToolTip.com ] Defending and Deploying AI

磁力链接/BT种子名称

[ WebToolTip.com ] Defending and Deploying AI

磁力链接/BT种子简介

种子哈希:67a281a7336a5bb8ca143a74e7024aa795c6f4fe
文件大小: 3.36G
已经下载:23次
下载速度:极快
收录时间:2025-10-03
最近下载:2025-10-05

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:67A281A7336A5BB8CA143A74E7024AA795C6F4FE
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 91视频 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 抖阴破解版 极乐禁地 91短视频 抖音Max TikTok成人版 PornHub 听泉鉴鲍 少女日记 草榴社区 哆哔涩漫 呦乐园 萝莉岛 悠悠禁区 悠悠禁区 拔萝卜 疯马秀

最近搜索

小学生开学 偷拍衣室 和口 91id:chen 一路向西 yumemiru 不认识 巨乳 露出 爆操约炮 推特大神【 演技 金颜希 人妻母狗调教 丰满 内射 新黑客破解家庭摄像头 人妻美臀 领家妹妹 中学学生 夏夏夏夏 极上巨乳 个人 给他 桑 高端私密流出 幸福 sister 不开心 很硬 酒店颜 视图推特

文件列表

  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/005. 4.4 Exploring Examples of LangGraph in Action.mp4 90.8 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/004. 1.3 Embeddings and Embedding Models.mp4 85.4 MB
  • ~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/004. 2.3 Prompt templates and system prompts.mp4 77.8 MB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/006. 3.5 Creating a Basic RAG Application.mp4 73.2 MB
  • ~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environme.mp4 71.2 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/015. 1.14 Introducing A2A and AGNTCY.mp4 70.3 MB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4 69.3 MB
  • ~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/004. 2.3 Securing AI Implementations.mp4 66.2 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/010. 1.9 Running Open Weight Models with Ollama.mp4 65.8 MB
  • ~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 63.2 MB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/006. 4.5 Exploring an Example of Agents with MCP Servers.mp4 62.2 MB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/004. 3.3 Creating Prompt Branching Chains.mp4 59.6 MB
  • ~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 54.9 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/003. 1.2 Choosing the Right Hardware (GPUs, CPUs, Memory, etc.).mp4 52.7 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/011. 1.10 Exploring Open WebUI and Other Ollama Plugins.mp4 52.2 MB
  • ~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4 51.5 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/014. 1.13 Introducing the Model Context Protocol (MCP).mp4 51.3 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/008. 1.7 RAG vs. Fine-tuning.mp4 51.3 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 51.2 MB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/003. 3.2 Exploring Basic Prompt Chain Examples.mp4 49.5 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/010. 1.9 Ollama Integrations.mp4 49.3 MB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/005. 2.4 Exploring Google Vertex AI.mp4 45.5 MB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/005. 3.4 Exploring Parallel PromptChains.mp4 44.2 MB
  • ~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4 43.7 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/013. 1.12 Leveraging RAGFlow.mp4 42.6 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/007. 1.6 Introducing Embedding Models.mp4 41.5 MB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 40.1 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/006. 1.5 Introducing Retrieval Augmented Generation (RAG).mp4 39.5 MB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/007. 4.6 Securing Agentic Implementations.mp4 39.2 MB
  • ~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 38.0 MB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/006. 2.5 Using Microsoft Azure AI Foundry.mp4 38.0 MB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/004. 2.3 Surveying Amazon SageMaker.mp4 38.0 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/007. 1.6 Chunking Strategies.mp4 37.2 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/005. 1.4 Indexing Techniques.mp4 36.0 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 35.6 MB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/008. 3.7 Understanding Embedding Models.mp4 33.5 MB
  • ~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/005. 2.4 Exploring Network Security Processes Incorporating AI Tools.mp4 33.4 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).mp4 31.4 MB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/008. 3.7 Prompt Engineering for Software Development.mp4 31.1 MB
  • ~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4 30.7 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/009. 1.8 RAG, RAG Fusion, and RAPTOR.mp4 30.5 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.mp4 28.5 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 27.7 MB
  • ~Get Your Files Here !/Lesson 4 - Using AI for Networking/002. 4.1 Exploring how AI is Revolutionizing Networking.mp4 27.0 MB
  • ~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/005. 2.4 Introducing LangSmith.mp4 25.9 MB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/003. 4.2 Surveying CrewAI.mp4 25.7 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/009. 1.8 Introducing Semantic Search.mp4 25.7 MB
  • ~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4 24.6 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/002. 1.1 Introduction to Retrieval Augmented Generation (RAG).mp4 24.2 MB
  • ~Get Your Files Here !/Lesson 4 - Using AI for Networking/003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.mp4 23.8 MB
  • ~Get Your Files Here !/Lesson 4 - Using AI for Networking/005. 4.4 Prompt Engineering for Networking.mp4 23.6 MB
  • ~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/003. 5.2 Regulatory and Policy Frameworks.mp4 23.0 MB
  • ~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4 22.9 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/007. 1.6 Understanding the NIST Taxonomy and Terminology of Attacks and Mitigations.mp4 22.7 MB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/007. 2.6 Discussing Cost Management and Security.mp4 22.6 MB
  • ~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4 22.3 MB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/003. 2.2 Introducing Amazon Bedrock.mp4 22.1 MB
  • ~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/003. 2.2 LangChain vs. LlamaIndex.mp4 22.1 MB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/005. 3.4 Generating Code from a Prompt.mp4 22.0 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 21.9 MB
  • ~Get Your Files Here !/AI-Enabled Programming, Networking, and Cybersecurity - Introduction/001. Introduction.mp4 21.5 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/002. 1.1 Overview of AI Labs and Sandboxes - Home-based vs. Cloud-based.mp4 21.1 MB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 21.0 MB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/004. 3.3 Leveraging the Strengths of Both Environments.mp4 20.4 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/006. 1.5 Vector Databases.mp4 20.4 MB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/002. 4.1 Introduction to AI Agent Frameworks.mp4 20.1 MB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/002. 2.1 Advantages and Disadvantages of Cloud AI Labs and Sandboxes.mp4 20.0 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/001. Learning objectives.mp4 19.8 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/006. 1.5 Surveying Essential Software (Python, Anaconda, Jupyter Notebooks, and Other Frameworks).mp4 19.7 MB
  • ~Get Your Files Here !/Securing Generative AI - Introduction/001. Introduction.mp4 19.7 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/012. 1.11 Introduction to AI Agents and Agentic Implementations.mp4 19.3 MB
  • ~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4 19.0 MB
  • ~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/002. 2.1 Introducing LangChain.mp4 19.0 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/013. 1.12 Introduction to Agentic RAG.mp4 18.8 MB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/007. 3.6 Creating a Complete RAG Application.mp4 18.6 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.mp4 18.5 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/002. 1.1 Overview of the Evolution of AI-driven Tools.mp4 18.5 MB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/009. 3.8 Using Vector Databases.mp4 18.2 MB
  • ~Get Your Files Here !/AI-Enabled Programming, Networking, and Cybersecurity - Summary/001. Summary.mp4 18.2 MB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 18.1 MB
  • ~Get Your Files Here !/Lesson 4 - Advanced Topics/003. 4.2 Using Fine Tuning Frameworks.mp4 17.9 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/005. 1.4 An Overview of Open-source AI Models and Hugging Face.mp4 17.9 MB
  • ~Get Your Files Here !/AI Agents and Agentic RAG for Cybersecurity - Summary/001. Summary.mp4 17.5 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/005. 1.4 Choosing the Operating Systems (Linux, Windows, macOS).mp4 17.5 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/009. 1.8 Installing Ollama.mp4 17.4 MB
  • ~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/003. 5.2 Exploring Model Theft Attacks.mp4 17.3 MB
  • ~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.mp4 17.0 MB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/002. 3.1 Mastering Prompt Engineering.mp4 16.9 MB
  • ~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/002. 2.1 Accelerating Network Security Tasks with AI.mp4 16.9 MB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/005. 2.4 Enforcing Privilege Control on LLM Access to Backend Systems.mp4 16.7 MB
  • ~Get Your Files Here !/AI Agents and Agentic RAG for Cybersecurity - Introduction/001. Introduction.mp4 16.5 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/004. 1.3 Building or Buying Pre-built Systems.mp4 15.9 MB
  • ~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/004. 4.3 Avoiding Excessive Agency.mp4 15.6 MB
  • ~Get Your Files Here !/Lesson 4 - Advanced Topics/002. 4.1 Leveraging LangSmith and LangGraph.mp4 15.4 MB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/007. 3.6 Generating Comments.mp4 15.2 MB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/001. Learning objectives.mp4 15.1 MB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/005. 3.4 Running Open-Source Models Available on Hugging Face.mp4 14.8 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/012. 1.11 Introducing Retrieval Augmented Generation (RAG).mp4 14.6 MB
  • ~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/004. 5.3 Staying Updated on Advancements in AI and Cybersecurity.mp4 14.5 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/007. 1.6 Introducing Hugging Face.mp4 14.5 MB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/006. 3.5 Explaining Existing Code.mp4 13.7 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/011. 1.10 Exploring the Ollama REST API.mp4 13.3 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/003. 1.2 Exploring the GitHub Repositories and Additional Resources.mp4 13.2 MB
  • ~Get Your Files Here !/Build Your Own AI Lab - Introduction/001. Introduction.mp4 12.9 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/008. 1.7 Introducing Ollama.mp4 12.8 MB
  • ~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/003. 4.2 Exploiting Insecure Plugin Design.mp4 12.7 MB
  • ~Get Your Files Here !/Lesson 4 - Advanced Topics/004. 4.3 High-Performance Computing and Edge AI.mp4 12.4 MB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/002. 3.1 Exploring How AI is Revolutionizing Software Development.mp4 12.2 MB
  • ~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/003. 2.2 Prompt Engineering for Cybersecurity.mp4 11.8 MB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/003. 3.2 Synchronizing Data and Projects.mp4 11.7 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/003. 1.2 Exploring the Resources for this Course - GitHub Repositories and Others.mp4 11.5 MB
  • ~Get Your Files Here !/Securing Generative AI - Summary/001. Summary.mp4 11.1 MB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/008. 2.7 Using Terraform to Deploy Ollama in the Cloud.mp4 10.9 MB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/006. 2.5 Best Practices Around API Tokens for Plugins, Data Access, and Function-level Permissions.mp4 10.7 MB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/004. 4.3 Introducing LangGraph.mp4 10.6 MB
  • ~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/003. 3.2 Exploring Model Denial of Service Attacks.mp4 10.4 MB
  • ~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/001. Learning objectives.mp4 10.0 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/001. Learning objectives.mp4 9.9 MB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/006. 3.5 Introducing LangChain.mp4 9.7 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/001. Learning objectives.mp4 9.6 MB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/001. Learning objectives.mp4 9.0 MB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/007. 2.6 Understanding Insecure Output Handling Attacks.mp4 8.8 MB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/003. 3.2 Surveying GitHub Copilot, Cursor, and Cody.mp4 7.9 MB
  • ~Get Your Files Here !/Lesson 4 - Using AI for Networking/004. 4.3 Exploring AI Models for Networking Use Cases.mp4 7.8 MB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/007. 3.6 Introducing LlamaIndex.mp4 7.8 MB
  • ~Get Your Files Here !/Build Your Own AI Lab - Summary/001. Summary.mp4 7.6 MB
  • ~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/001. Learning objectives.mp4 7.4 MB
  • ~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/001. Learning objectives.mp4 7.1 MB
  • ~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/001. Learning objectives.mp4 7.1 MB
  • ~Get Your Files Here !/Lesson 4 - Using AI for Networking/001. Learning objectives.mp4 7.0 MB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/001. Learning objectives.mp4 7.0 MB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/001. Learning objectives.mp4 6.9 MB
  • ~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/001. Learning objectives.mp4 6.8 MB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/001. Learning objectives.mp4 6.5 MB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/002. 3.1 Using Hybrid AI Labs - Combining Home and Cloud Resources.mp4 6.2 MB
  • ~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/001. Learning objectives.mp4 5.2 MB
  • ~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/001. Learning objectives.mp4 4.7 MB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/001. Learning objectives.mp4 4.7 MB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/001. Learning objectives.mp4 4.0 MB
  • ~Get Your Files Here !/Lesson 4 - Advanced Topics/001. Learning objectives.mp4 3.9 MB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/004. 3.3 Exploring the CODEX Model.mp4 3.7 MB
  • ~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.en.srt 25.7 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/015. 1.14 Introducing A2A and AGNTCY.en.srt 23.3 kB
  • ~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environme.srt 23.2 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/004. 1.3 Embeddings and Embedding Models.en.srt 21.6 kB
  • ~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/004. 2.3 Securing AI Implementations.en.srt 21.2 kB
  • ~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.en.srt 19.7 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/010. 1.9 Running Open Weight Models with Ollama.en.srt 19.4 kB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/005. 4.4 Exploring Examples of LangGraph in Action.en.srt 19.4 kB
  • ~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.en.srt 19.3 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).en.srt 18.8 kB
  • ~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/004. 2.3 Prompt templates and system prompts.en.srt 18.2 kB
  • ~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.en.srt 18.1 kB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/006. 3.5 Creating a Basic RAG Application.en.srt 18.1 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/010. 1.9 Ollama Integrations.en.srt 18.0 kB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.en.srt 17.8 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/013. 1.12 Leveraging RAGFlow.en.srt 17.3 kB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/005. 2.4 Exploring Google Vertex AI.en.srt 17.2 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/014. 1.13 Introducing the Model Context Protocol (MCP).en.srt 16.9 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/008. 1.7 RAG vs. Fine-tuning.en.srt 16.7 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/006. 1.5 Introducing Retrieval Augmented Generation (RAG).en.srt 16.6 kB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/004. 2.3 Surveying Amazon SageMaker.en.srt 15.7 kB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/006. 4.5 Exploring an Example of Agents with MCP Servers.en.srt 15.6 kB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.en.srt 15.6 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/005. 1.4 Indexing Techniques.en.srt 15.2 kB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/004. 3.3 Creating Prompt Branching Chains.en.srt 15.0 kB
  • ~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.en.srt 14.3 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/011. 1.10 Exploring Open WebUI and Other Ollama Plugins.en.srt 14.2 kB
  • ~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.en.srt 13.9 kB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/007. 4.6 Securing Agentic Implementations.en.srt 13.8 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/009. 1.8 RAG, RAG Fusion, and RAPTOR.en.srt 13.7 kB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/008. 3.7 Prompt Engineering for Software Development.en.srt 12.7 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).en.srt 12.5 kB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/003. 3.2 Exploring Basic Prompt Chain Examples.en.srt 12.3 kB
  • ~Get Your Files Here !/Lesson 4 - Using AI for Networking/002. 4.1 Exploring how AI is Revolutionizing Networking.en.srt 12.2 kB
  • ~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/005. 2.4 Exploring Network Security Processes Incorporating AI Tools.en.srt 12.0 kB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/006. 2.5 Using Microsoft Azure AI Foundry.en.srt 11.8 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/003. 1.2 Choosing the Right Hardware (GPUs, CPUs, Memory, etc.).en.srt 11.7 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/007. 1.6 Chunking Strategies.en.srt 11.7 kB
  • ~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.en.srt 11.4 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/007. 1.6 Understanding the NIST Taxonomy and Terminology of Attacks and Mitigations.en.srt 11.0 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.en.srt 10.7 kB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/002. 2.1 Advantages and Disadvantages of Cloud AI Labs and Sandboxes.en.srt 10.5 kB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/003. 4.2 Surveying CrewAI.en.srt 10.0 kB
  • ~Get Your Files Here !/Lesson 4 - Using AI for Networking/003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.en.srt 9.4 kB
  • ~Get Your Files Here !/Lesson 4 - Using AI for Networking/005. 4.4 Prompt Engineering for Networking.en.srt 9.3 kB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/005. 3.4 Exploring Parallel PromptChains.en.srt 9.3 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/002. 1.1 Overview of AI Labs and Sandboxes - Home-based vs. Cloud-based.en.srt 9.1 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.en.srt 8.9 kB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/003. 2.2 Introducing Amazon Bedrock.en.srt 8.8 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/002. 1.1 Introduction to Retrieval Augmented Generation (RAG).en.srt 8.7 kB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/005. 2.4 Enforcing Privilege Control on LLM Access to Backend Systems.en.srt 8.6 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.en.srt 8.6 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.en.srt 8.6 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/007. 1.6 Introducing Embedding Models.en.srt 8.4 kB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/007. 2.6 Discussing Cost Management and Security.en.srt 8.4 kB
  • ~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.en.srt 8.3 kB
  • ~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/005. 2.4 Introducing LangSmith.en.srt 8.2 kB
  • ~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/003. 5.2 Regulatory and Policy Frameworks.en.srt 8.0 kB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/005. 3.4 Generating Code from a Prompt.en.srt 7.9 kB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/008. 3.7 Understanding Embedding Models.en.srt 7.7 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/012. 1.11 Introduction to AI Agents and Agentic Implementations.en.srt 7.6 kB
  • ~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/002. 2.1 Accelerating Network Security Tasks with AI.en.srt 7.6 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/006. 1.5 Vector Databases.en.srt 7.5 kB
  • ~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.en.srt 7.5 kB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/002. 4.1 Introduction to AI Agent Frameworks.en.srt 7.2 kB
  • ~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/003. 5.2 Exploring Model Theft Attacks.en.srt 7.2 kB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/004. 3.3 Leveraging the Strengths of Both Environments.en.srt 7.0 kB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.en.srt 7.0 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/013. 1.12 Introduction to Agentic RAG.en.srt 6.9 kB
  • ~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.en.srt 6.8 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/009. 1.8 Installing Ollama.en.srt 6.7 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/012. 1.11 Introducing Retrieval Augmented Generation (RAG).en.srt 6.6 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/009. 1.8 Introducing Semantic Search.en.srt 6.4 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/002. 1.1 Overview of the Evolution of AI-driven Tools.en.srt 6.4 kB
  • ~Get Your Files Here !/Lesson 4 - Advanced Topics/003. 4.2 Using Fine Tuning Frameworks.en.srt 6.3 kB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/009. 3.8 Using Vector Databases.en.srt 6.2 kB
  • ~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/002. 2.1 Introducing LangChain.en.srt 6.1 kB
  • ~Get Your Files Here !/Lesson 4 - Advanced Topics/002. 4.1 Leveraging LangSmith and LangGraph.en.srt 5.9 kB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.en.srt 5.8 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/006. 1.5 Surveying Essential Software (Python, Anaconda, Jupyter Notebooks, and Other Frameworks).en.srt 5.7 kB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/007. 3.6 Generating Comments.en.srt 5.7 kB
  • ~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/004. 5.3 Staying Updated on Advancements in AI and Cybersecurity.en.srt 5.6 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.en.srt 5.5 kB
  • ~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/003. 2.2 LangChain vs. LlamaIndex.en.srt 5.5 kB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/005. 3.4 Running Open-Source Models Available on Hugging Face.en.srt 5.5 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/004. 1.3 Building or Buying Pre-built Systems.en.srt 5.4 kB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/003. 3.2 Synchronizing Data and Projects.en.srt 5.4 kB
  • ~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/004. 4.3 Avoiding Excessive Agency.en.srt 5.3 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/005. 1.4 Choosing the Operating Systems (Linux, Windows, macOS).en.srt 5.1 kB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/002. 3.1 Mastering Prompt Engineering.en.srt 5.0 kB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/007. 3.6 Creating a Complete RAG Application.en.srt 4.9 kB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/007. 2.6 Understanding Insecure Output Handling Attacks.en.srt 4.9 kB
  • ~Get Your Files Here !/Lesson 4 - Advanced Topics/004. 4.3 High-Performance Computing and Edge AI.en.srt 4.8 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/003. 1.2 Exploring the Resources for this Course - GitHub Repositories and Others.en.srt 4.7 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/005. 1.4 An Overview of Open-source AI Models and Hugging Face.en.srt 4.5 kB
  • ~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/003. 3.2 Exploring Model Denial of Service Attacks.en.srt 4.4 kB
  • ~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/003. 4.2 Exploiting Insecure Plugin Design.en.srt 4.4 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/007. 1.6 Introducing Hugging Face.en.srt 4.4 kB
  • ~Get Your Files Here !/AI-Enabled Programming, Networking, and Cybersecurity - Introduction/001. Introduction.en.srt 4.4 kB
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/008. 2.7 Using Terraform to Deploy Ollama in the Cloud.en.srt 4.3 kB
  • ~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.en.srt 4.3 kB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/006. 2.5 Best Practices Around API Tokens for Plugins, Data Access, and Function-level Permissions.en.srt 4.2 kB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/006. 3.5 Explaining Existing Code.en.srt 4.2 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/003. 1.2 Exploring the GitHub Repositories and Additional Resources.en.srt 4.1 kB
  • ~Get Your Files Here !/Securing Generative AI - Introduction/001. Introduction.en.srt 4.1 kB
  • ~Get Your Files Here !/AI-Enabled Programming, Networking, and Cybersecurity - Summary/001. Summary.en.srt 4.0 kB
  • ~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/003. 2.2 Prompt Engineering for Cybersecurity.en.srt 3.9 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/001. Learning objectives.en.srt 3.9 kB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/006. 3.5 Introducing LangChain.en.srt 3.9 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/008. 1.7 Introducing Ollama.en.srt 3.7 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/011. 1.10 Exploring the Ollama REST API.en.srt 3.5 kB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/002. 3.1 Exploring How AI is Revolutionizing Software Development.en.srt 3.3 kB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/003. 3.2 Surveying GitHub Copilot, Cursor, and Cody.en.srt 3.2 kB
  • ~Get Your Files Here !/Lesson 4 - Using AI for Networking/004. 4.3 Exploring AI Models for Networking Use Cases.en.srt 3.1 kB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/001. Learning objectives.en.srt 3.0 kB
  • ~Get Your Files Here !/AI Agents and Agentic RAG for Cybersecurity - Summary/001. Summary.en.srt 3.0 kB
  • ~Get Your Files Here !/AI Agents and Agentic RAG for Cybersecurity - Introduction/001. Introduction.en.srt 2.9 kB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/004. 4.3 Introducing LangGraph.en.srt 2.8 kB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/007. 3.6 Introducing LlamaIndex.en.srt 2.7 kB
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/002. 3.1 Using Hybrid AI Labs - Combining Home and Cloud Resources.en.srt 2.5 kB
  • ~Get Your Files Here !/Build Your Own AI Lab - Introduction/001. Introduction.en.srt 2.4 kB
  • ~Get Your Files Here !/Securing Generative AI - Summary/001. Summary.en.srt 2.3 kB
  • ~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/001. Learning objectives.en.srt 2.0 kB
  • ~Get Your Files Here !/Lesson 3 - Using AI for Software Development/004. 3.3 Exploring the CODEX Model.en.srt 1.7 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/001. Learning objectives.en.srt 1.6 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/001. Learning objectives.en.srt 1.6 kB
  • ~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/001. Learning objectives.en.srt 1.5 kB
  • ~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/001. Learning objectives.en.srt 1.5 kB
  • ~Get Your Files Here !/Lesson 4 - Using AI for Networking/001. Learning objectives.en.srt 1.5 kB
  • ~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/001. Learning objectives.en.srt 1.4 kB
  • ~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/001. Learning objectives.en.srt 1.4 kB
  • ~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/001. Learning objectives.en.srt 1.3 kB
  • ~Get Your Files Here !/Build Your Own AI Lab - Summary/001. Summary.en.srt 1.3 kB
  • ~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/001. Learning objectives.en.srt 1.2 kB
  • ~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/001. Learning objectives.en.srt 1.1 kB
  • ~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/001. Learning objectives.en.srt 1.1 kB
  • ~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/001. Learning objectives.en.srt 951 Bytes
  • ~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/001. Learning objectives.en.srt 885 Bytes
  • ~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/001. Learning objectives.en.srt 718 Bytes
  • ~Get Your Files Here !/Lesson 4 - Advanced Topics/001. Learning objectives.en.srt 612 Bytes
  • ~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/001. Learning objectives.en.srt 542 Bytes
  • Get Bonus Downloads Here.url 180 Bytes
  • ~Get Your Files Here !/Bonus Resources.txt 70 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!