搜索
[ WebToolTip.com ] Defending and Deploying AI
磁力链接/BT种子名称
[ WebToolTip.com ] Defending and Deploying AI
磁力链接/BT种子简介
种子哈希:
67a281a7336a5bb8ca143a74e7024aa795c6f4fe
文件大小:
3.36G
已经下载:
23
次
下载速度:
极快
收录时间:
2025-10-03
最近下载:
2025-10-05
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:67A281A7336A5BB8CA143A74E7024AA795C6F4FE
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
抖音Max
TikTok成人版
PornHub
听泉鉴鲍
少女日记
草榴社区
哆哔涩漫
呦乐园
萝莉岛
悠悠禁区
悠悠禁区
拔萝卜
疯马秀
最近搜索
小学生开学
偷拍衣室
和口
91id:chen
一路向西
yumemiru
不认识
巨乳 露出
爆操约炮
推特大神【
演技
金颜希
人妻母狗调教
丰满 内射
新黑客破解家庭摄像头
人妻美臀
领家妹妹
中学学生
夏夏夏夏
极上巨乳
个人
给他
桑
高端私密流出
幸福
sister
不开心
很硬
酒店颜
视图推特
文件列表
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/005. 4.4 Exploring Examples of LangGraph in Action.mp4
90.8 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/004. 1.3 Embeddings and Embedding Models.mp4
85.4 MB
~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/004. 2.3 Prompt templates and system prompts.mp4
77.8 MB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/006. 3.5 Creating a Basic RAG Application.mp4
73.2 MB
~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environme.mp4
71.2 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/015. 1.14 Introducing A2A and AGNTCY.mp4
70.3 MB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4
69.3 MB
~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/004. 2.3 Securing AI Implementations.mp4
66.2 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/010. 1.9 Running Open Weight Models with Ollama.mp4
65.8 MB
~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4
63.2 MB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/006. 4.5 Exploring an Example of Agents with MCP Servers.mp4
62.2 MB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/004. 3.3 Creating Prompt Branching Chains.mp4
59.6 MB
~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4
54.9 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/003. 1.2 Choosing the Right Hardware (GPUs, CPUs, Memory, etc.).mp4
52.7 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/011. 1.10 Exploring Open WebUI and Other Ollama Plugins.mp4
52.2 MB
~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4
51.5 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/014. 1.13 Introducing the Model Context Protocol (MCP).mp4
51.3 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/008. 1.7 RAG vs. Fine-tuning.mp4
51.3 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4
51.2 MB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/003. 3.2 Exploring Basic Prompt Chain Examples.mp4
49.5 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/010. 1.9 Ollama Integrations.mp4
49.3 MB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/005. 2.4 Exploring Google Vertex AI.mp4
45.5 MB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/005. 3.4 Exploring Parallel PromptChains.mp4
44.2 MB
~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4
43.7 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/013. 1.12 Leveraging RAGFlow.mp4
42.6 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/007. 1.6 Introducing Embedding Models.mp4
41.5 MB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4
40.1 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/006. 1.5 Introducing Retrieval Augmented Generation (RAG).mp4
39.5 MB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/007. 4.6 Securing Agentic Implementations.mp4
39.2 MB
~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4
38.0 MB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/006. 2.5 Using Microsoft Azure AI Foundry.mp4
38.0 MB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/004. 2.3 Surveying Amazon SageMaker.mp4
38.0 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/007. 1.6 Chunking Strategies.mp4
37.2 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/005. 1.4 Indexing Techniques.mp4
36.0 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4
35.6 MB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/008. 3.7 Understanding Embedding Models.mp4
33.5 MB
~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/005. 2.4 Exploring Network Security Processes Incorporating AI Tools.mp4
33.4 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).mp4
31.4 MB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/008. 3.7 Prompt Engineering for Software Development.mp4
31.1 MB
~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4
30.7 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/009. 1.8 RAG, RAG Fusion, and RAPTOR.mp4
30.5 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.mp4
28.5 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4
27.7 MB
~Get Your Files Here !/Lesson 4 - Using AI for Networking/002. 4.1 Exploring how AI is Revolutionizing Networking.mp4
27.0 MB
~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/005. 2.4 Introducing LangSmith.mp4
25.9 MB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/003. 4.2 Surveying CrewAI.mp4
25.7 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/009. 1.8 Introducing Semantic Search.mp4
25.7 MB
~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4
24.6 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/002. 1.1 Introduction to Retrieval Augmented Generation (RAG).mp4
24.2 MB
~Get Your Files Here !/Lesson 4 - Using AI for Networking/003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.mp4
23.8 MB
~Get Your Files Here !/Lesson 4 - Using AI for Networking/005. 4.4 Prompt Engineering for Networking.mp4
23.6 MB
~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/003. 5.2 Regulatory and Policy Frameworks.mp4
23.0 MB
~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4
22.9 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/007. 1.6 Understanding the NIST Taxonomy and Terminology of Attacks and Mitigations.mp4
22.7 MB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/007. 2.6 Discussing Cost Management and Security.mp4
22.6 MB
~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4
22.3 MB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/003. 2.2 Introducing Amazon Bedrock.mp4
22.1 MB
~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/003. 2.2 LangChain vs. LlamaIndex.mp4
22.1 MB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/005. 3.4 Generating Code from a Prompt.mp4
22.0 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4
21.9 MB
~Get Your Files Here !/AI-Enabled Programming, Networking, and Cybersecurity - Introduction/001. Introduction.mp4
21.5 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/002. 1.1 Overview of AI Labs and Sandboxes - Home-based vs. Cloud-based.mp4
21.1 MB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4
21.0 MB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/004. 3.3 Leveraging the Strengths of Both Environments.mp4
20.4 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/006. 1.5 Vector Databases.mp4
20.4 MB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/002. 4.1 Introduction to AI Agent Frameworks.mp4
20.1 MB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/002. 2.1 Advantages and Disadvantages of Cloud AI Labs and Sandboxes.mp4
20.0 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/001. Learning objectives.mp4
19.8 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/006. 1.5 Surveying Essential Software (Python, Anaconda, Jupyter Notebooks, and Other Frameworks).mp4
19.7 MB
~Get Your Files Here !/Securing Generative AI - Introduction/001. Introduction.mp4
19.7 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/012. 1.11 Introduction to AI Agents and Agentic Implementations.mp4
19.3 MB
~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4
19.0 MB
~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/002. 2.1 Introducing LangChain.mp4
19.0 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/013. 1.12 Introduction to Agentic RAG.mp4
18.8 MB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/007. 3.6 Creating a Complete RAG Application.mp4
18.6 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.mp4
18.5 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/002. 1.1 Overview of the Evolution of AI-driven Tools.mp4
18.5 MB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/009. 3.8 Using Vector Databases.mp4
18.2 MB
~Get Your Files Here !/AI-Enabled Programming, Networking, and Cybersecurity - Summary/001. Summary.mp4
18.2 MB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4
18.1 MB
~Get Your Files Here !/Lesson 4 - Advanced Topics/003. 4.2 Using Fine Tuning Frameworks.mp4
17.9 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/005. 1.4 An Overview of Open-source AI Models and Hugging Face.mp4
17.9 MB
~Get Your Files Here !/AI Agents and Agentic RAG for Cybersecurity - Summary/001. Summary.mp4
17.5 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/005. 1.4 Choosing the Operating Systems (Linux, Windows, macOS).mp4
17.5 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/009. 1.8 Installing Ollama.mp4
17.4 MB
~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/003. 5.2 Exploring Model Theft Attacks.mp4
17.3 MB
~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.mp4
17.0 MB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/002. 3.1 Mastering Prompt Engineering.mp4
16.9 MB
~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/002. 2.1 Accelerating Network Security Tasks with AI.mp4
16.9 MB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/005. 2.4 Enforcing Privilege Control on LLM Access to Backend Systems.mp4
16.7 MB
~Get Your Files Here !/AI Agents and Agentic RAG for Cybersecurity - Introduction/001. Introduction.mp4
16.5 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/004. 1.3 Building or Buying Pre-built Systems.mp4
15.9 MB
~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/004. 4.3 Avoiding Excessive Agency.mp4
15.6 MB
~Get Your Files Here !/Lesson 4 - Advanced Topics/002. 4.1 Leveraging LangSmith and LangGraph.mp4
15.4 MB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/007. 3.6 Generating Comments.mp4
15.2 MB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/001. Learning objectives.mp4
15.1 MB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/005. 3.4 Running Open-Source Models Available on Hugging Face.mp4
14.8 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/012. 1.11 Introducing Retrieval Augmented Generation (RAG).mp4
14.6 MB
~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/004. 5.3 Staying Updated on Advancements in AI and Cybersecurity.mp4
14.5 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/007. 1.6 Introducing Hugging Face.mp4
14.5 MB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/006. 3.5 Explaining Existing Code.mp4
13.7 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/011. 1.10 Exploring the Ollama REST API.mp4
13.3 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/003. 1.2 Exploring the GitHub Repositories and Additional Resources.mp4
13.2 MB
~Get Your Files Here !/Build Your Own AI Lab - Introduction/001. Introduction.mp4
12.9 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/008. 1.7 Introducing Ollama.mp4
12.8 MB
~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/003. 4.2 Exploiting Insecure Plugin Design.mp4
12.7 MB
~Get Your Files Here !/Lesson 4 - Advanced Topics/004. 4.3 High-Performance Computing and Edge AI.mp4
12.4 MB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/002. 3.1 Exploring How AI is Revolutionizing Software Development.mp4
12.2 MB
~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/003. 2.2 Prompt Engineering for Cybersecurity.mp4
11.8 MB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/003. 3.2 Synchronizing Data and Projects.mp4
11.7 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/003. 1.2 Exploring the Resources for this Course - GitHub Repositories and Others.mp4
11.5 MB
~Get Your Files Here !/Securing Generative AI - Summary/001. Summary.mp4
11.1 MB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/008. 2.7 Using Terraform to Deploy Ollama in the Cloud.mp4
10.9 MB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/006. 2.5 Best Practices Around API Tokens for Plugins, Data Access, and Function-level Permissions.mp4
10.7 MB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/004. 4.3 Introducing LangGraph.mp4
10.6 MB
~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/003. 3.2 Exploring Model Denial of Service Attacks.mp4
10.4 MB
~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/001. Learning objectives.mp4
10.0 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/001. Learning objectives.mp4
9.9 MB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/006. 3.5 Introducing LangChain.mp4
9.7 MB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/001. Learning objectives.mp4
9.6 MB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/001. Learning objectives.mp4
9.0 MB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/007. 2.6 Understanding Insecure Output Handling Attacks.mp4
8.8 MB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/003. 3.2 Surveying GitHub Copilot, Cursor, and Cody.mp4
7.9 MB
~Get Your Files Here !/Lesson 4 - Using AI for Networking/004. 4.3 Exploring AI Models for Networking Use Cases.mp4
7.8 MB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/007. 3.6 Introducing LlamaIndex.mp4
7.8 MB
~Get Your Files Here !/Build Your Own AI Lab - Summary/001. Summary.mp4
7.6 MB
~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/001. Learning objectives.mp4
7.4 MB
~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/001. Learning objectives.mp4
7.1 MB
~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/001. Learning objectives.mp4
7.1 MB
~Get Your Files Here !/Lesson 4 - Using AI for Networking/001. Learning objectives.mp4
7.0 MB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/001. Learning objectives.mp4
7.0 MB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/001. Learning objectives.mp4
6.9 MB
~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/001. Learning objectives.mp4
6.8 MB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/001. Learning objectives.mp4
6.5 MB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/002. 3.1 Using Hybrid AI Labs - Combining Home and Cloud Resources.mp4
6.2 MB
~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/001. Learning objectives.mp4
5.2 MB
~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/001. Learning objectives.mp4
4.7 MB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/001. Learning objectives.mp4
4.7 MB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/001. Learning objectives.mp4
4.0 MB
~Get Your Files Here !/Lesson 4 - Advanced Topics/001. Learning objectives.mp4
3.9 MB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/004. 3.3 Exploring the CODEX Model.mp4
3.7 MB
~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.en.srt
25.7 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/015. 1.14 Introducing A2A and AGNTCY.en.srt
23.3 kB
~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environme.srt
23.2 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/004. 1.3 Embeddings and Embedding Models.en.srt
21.6 kB
~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/004. 2.3 Securing AI Implementations.en.srt
21.2 kB
~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.en.srt
19.7 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/010. 1.9 Running Open Weight Models with Ollama.en.srt
19.4 kB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/005. 4.4 Exploring Examples of LangGraph in Action.en.srt
19.4 kB
~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.en.srt
19.3 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).en.srt
18.8 kB
~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/004. 2.3 Prompt templates and system prompts.en.srt
18.2 kB
~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.en.srt
18.1 kB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/006. 3.5 Creating a Basic RAG Application.en.srt
18.1 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/010. 1.9 Ollama Integrations.en.srt
18.0 kB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.en.srt
17.8 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/013. 1.12 Leveraging RAGFlow.en.srt
17.3 kB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/005. 2.4 Exploring Google Vertex AI.en.srt
17.2 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/014. 1.13 Introducing the Model Context Protocol (MCP).en.srt
16.9 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/008. 1.7 RAG vs. Fine-tuning.en.srt
16.7 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/006. 1.5 Introducing Retrieval Augmented Generation (RAG).en.srt
16.6 kB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/004. 2.3 Surveying Amazon SageMaker.en.srt
15.7 kB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/006. 4.5 Exploring an Example of Agents with MCP Servers.en.srt
15.6 kB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.en.srt
15.6 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/005. 1.4 Indexing Techniques.en.srt
15.2 kB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/004. 3.3 Creating Prompt Branching Chains.en.srt
15.0 kB
~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.en.srt
14.3 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/011. 1.10 Exploring Open WebUI and Other Ollama Plugins.en.srt
14.2 kB
~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.en.srt
13.9 kB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/007. 4.6 Securing Agentic Implementations.en.srt
13.8 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/009. 1.8 RAG, RAG Fusion, and RAPTOR.en.srt
13.7 kB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/008. 3.7 Prompt Engineering for Software Development.en.srt
12.7 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).en.srt
12.5 kB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/003. 3.2 Exploring Basic Prompt Chain Examples.en.srt
12.3 kB
~Get Your Files Here !/Lesson 4 - Using AI for Networking/002. 4.1 Exploring how AI is Revolutionizing Networking.en.srt
12.2 kB
~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/005. 2.4 Exploring Network Security Processes Incorporating AI Tools.en.srt
12.0 kB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/006. 2.5 Using Microsoft Azure AI Foundry.en.srt
11.8 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/003. 1.2 Choosing the Right Hardware (GPUs, CPUs, Memory, etc.).en.srt
11.7 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/007. 1.6 Chunking Strategies.en.srt
11.7 kB
~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.en.srt
11.4 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/007. 1.6 Understanding the NIST Taxonomy and Terminology of Attacks and Mitigations.en.srt
11.0 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.en.srt
10.7 kB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/002. 2.1 Advantages and Disadvantages of Cloud AI Labs and Sandboxes.en.srt
10.5 kB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/003. 4.2 Surveying CrewAI.en.srt
10.0 kB
~Get Your Files Here !/Lesson 4 - Using AI for Networking/003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.en.srt
9.4 kB
~Get Your Files Here !/Lesson 4 - Using AI for Networking/005. 4.4 Prompt Engineering for Networking.en.srt
9.3 kB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/005. 3.4 Exploring Parallel PromptChains.en.srt
9.3 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/002. 1.1 Overview of AI Labs and Sandboxes - Home-based vs. Cloud-based.en.srt
9.1 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.en.srt
8.9 kB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/003. 2.2 Introducing Amazon Bedrock.en.srt
8.8 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/002. 1.1 Introduction to Retrieval Augmented Generation (RAG).en.srt
8.7 kB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/005. 2.4 Enforcing Privilege Control on LLM Access to Backend Systems.en.srt
8.6 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.en.srt
8.6 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.en.srt
8.6 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/007. 1.6 Introducing Embedding Models.en.srt
8.4 kB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/007. 2.6 Discussing Cost Management and Security.en.srt
8.4 kB
~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.en.srt
8.3 kB
~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/005. 2.4 Introducing LangSmith.en.srt
8.2 kB
~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/003. 5.2 Regulatory and Policy Frameworks.en.srt
8.0 kB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/005. 3.4 Generating Code from a Prompt.en.srt
7.9 kB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/008. 3.7 Understanding Embedding Models.en.srt
7.7 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/012. 1.11 Introduction to AI Agents and Agentic Implementations.en.srt
7.6 kB
~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/002. 2.1 Accelerating Network Security Tasks with AI.en.srt
7.6 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/006. 1.5 Vector Databases.en.srt
7.5 kB
~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.en.srt
7.5 kB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/002. 4.1 Introduction to AI Agent Frameworks.en.srt
7.2 kB
~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/003. 5.2 Exploring Model Theft Attacks.en.srt
7.2 kB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/004. 3.3 Leveraging the Strengths of Both Environments.en.srt
7.0 kB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.en.srt
7.0 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/013. 1.12 Introduction to Agentic RAG.en.srt
6.9 kB
~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.en.srt
6.8 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/009. 1.8 Installing Ollama.en.srt
6.7 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/012. 1.11 Introducing Retrieval Augmented Generation (RAG).en.srt
6.6 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/009. 1.8 Introducing Semantic Search.en.srt
6.4 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/002. 1.1 Overview of the Evolution of AI-driven Tools.en.srt
6.4 kB
~Get Your Files Here !/Lesson 4 - Advanced Topics/003. 4.2 Using Fine Tuning Frameworks.en.srt
6.3 kB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/009. 3.8 Using Vector Databases.en.srt
6.2 kB
~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/002. 2.1 Introducing LangChain.en.srt
6.1 kB
~Get Your Files Here !/Lesson 4 - Advanced Topics/002. 4.1 Leveraging LangSmith and LangGraph.en.srt
5.9 kB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.en.srt
5.8 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/006. 1.5 Surveying Essential Software (Python, Anaconda, Jupyter Notebooks, and Other Frameworks).en.srt
5.7 kB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/007. 3.6 Generating Comments.en.srt
5.7 kB
~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/004. 5.3 Staying Updated on Advancements in AI and Cybersecurity.en.srt
5.6 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.en.srt
5.5 kB
~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/003. 2.2 LangChain vs. LlamaIndex.en.srt
5.5 kB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/005. 3.4 Running Open-Source Models Available on Hugging Face.en.srt
5.5 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/004. 1.3 Building or Buying Pre-built Systems.en.srt
5.4 kB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/003. 3.2 Synchronizing Data and Projects.en.srt
5.4 kB
~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/004. 4.3 Avoiding Excessive Agency.en.srt
5.3 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/005. 1.4 Choosing the Operating Systems (Linux, Windows, macOS).en.srt
5.1 kB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/002. 3.1 Mastering Prompt Engineering.en.srt
5.0 kB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/007. 3.6 Creating a Complete RAG Application.en.srt
4.9 kB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/007. 2.6 Understanding Insecure Output Handling Attacks.en.srt
4.9 kB
~Get Your Files Here !/Lesson 4 - Advanced Topics/004. 4.3 High-Performance Computing and Edge AI.en.srt
4.8 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/003. 1.2 Exploring the Resources for this Course - GitHub Repositories and Others.en.srt
4.7 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/005. 1.4 An Overview of Open-source AI Models and Hugging Face.en.srt
4.5 kB
~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/003. 3.2 Exploring Model Denial of Service Attacks.en.srt
4.4 kB
~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/003. 4.2 Exploiting Insecure Plugin Design.en.srt
4.4 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/007. 1.6 Introducing Hugging Face.en.srt
4.4 kB
~Get Your Files Here !/AI-Enabled Programming, Networking, and Cybersecurity - Introduction/001. Introduction.en.srt
4.4 kB
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/008. 2.7 Using Terraform to Deploy Ollama in the Cloud.en.srt
4.3 kB
~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.en.srt
4.3 kB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/006. 2.5 Best Practices Around API Tokens for Plugins, Data Access, and Function-level Permissions.en.srt
4.2 kB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/006. 3.5 Explaining Existing Code.en.srt
4.2 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/003. 1.2 Exploring the GitHub Repositories and Additional Resources.en.srt
4.1 kB
~Get Your Files Here !/Securing Generative AI - Introduction/001. Introduction.en.srt
4.1 kB
~Get Your Files Here !/AI-Enabled Programming, Networking, and Cybersecurity - Summary/001. Summary.en.srt
4.0 kB
~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/003. 2.2 Prompt Engineering for Cybersecurity.en.srt
3.9 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI-powered Tools/001. Learning objectives.en.srt
3.9 kB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/006. 3.5 Introducing LangChain.en.srt
3.9 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/008. 1.7 Introducing Ollama.en.srt
3.7 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/011. 1.10 Exploring the Ollama REST API.en.srt
3.5 kB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/002. 3.1 Exploring How AI is Revolutionizing Software Development.en.srt
3.3 kB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/003. 3.2 Surveying GitHub Copilot, Cursor, and Cody.en.srt
3.2 kB
~Get Your Files Here !/Lesson 4 - Using AI for Networking/004. 4.3 Exploring AI Models for Networking Use Cases.en.srt
3.1 kB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/001. Learning objectives.en.srt
3.0 kB
~Get Your Files Here !/AI Agents and Agentic RAG for Cybersecurity - Summary/001. Summary.en.srt
3.0 kB
~Get Your Files Here !/AI Agents and Agentic RAG for Cybersecurity - Introduction/001. Introduction.en.srt
2.9 kB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/004. 4.3 Introducing LangGraph.en.srt
2.8 kB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/007. 3.6 Introducing LlamaIndex.en.srt
2.7 kB
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/002. 3.1 Using Hybrid AI Labs - Combining Home and Cloud Resources.en.srt
2.5 kB
~Get Your Files Here !/Build Your Own AI Lab - Introduction/001. Introduction.en.srt
2.4 kB
~Get Your Files Here !/Securing Generative AI - Summary/001. Summary.en.srt
2.3 kB
~Get Your Files Here !/Lesson 2 - Using AI for Cybersecurity/001. Learning objectives.en.srt
2.0 kB
~Get Your Files Here !/Lesson 3 - Using AI for Software Development/004. 3.3 Exploring the CODEX Model.en.srt
1.7 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Threats and LLM Security/001. Learning objectives.en.srt
1.6 kB
~Get Your Files Here !/Lesson 1 - Introduction to AI Labs and Sandboxes/001. Learning objectives.en.srt
1.6 kB
~Get Your Files Here !/Lesson 1 - Introduction to RAG in Cybersecurity/001. Learning objectives.en.srt
1.5 kB
~Get Your Files Here !/Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/001. Learning objectives.en.srt
1.5 kB
~Get Your Files Here !/Lesson 4 - Using AI for Networking/001. Learning objectives.en.srt
1.5 kB
~Get Your Files Here !/Lesson 5 - Future Trends and Additional Emerging Technologies/001. Learning objectives.en.srt
1.4 kB
~Get Your Files Here !/Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/001. Learning objectives.en.srt
1.4 kB
~Get Your Files Here !/Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/001. Learning objectives.en.srt
1.3 kB
~Get Your Files Here !/Build Your Own AI Lab - Summary/001. Summary.en.srt
1.3 kB
~Get Your Files Here !/Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/001. Learning objectives.en.srt
1.2 kB
~Get Your Files Here !/Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/001. Learning objectives.en.srt
1.1 kB
~Get Your Files Here !/Lesson 4 - AI Agents and Agentic Frameworks/001. Learning objectives.en.srt
1.1 kB
~Get Your Files Here !/Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/001. Learning objectives.en.srt
951 Bytes
~Get Your Files Here !/Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/001. Learning objectives.en.srt
885 Bytes
~Get Your Files Here !/Lesson 3 - Integrating and Leveraging AI Environments/001. Learning objectives.en.srt
718 Bytes
~Get Your Files Here !/Lesson 4 - Advanced Topics/001. Learning objectives.en.srt
612 Bytes
~Get Your Files Here !/Lesson 2 - Cloud-Based AI Labs and Sandboxes/001. Learning objectives.en.srt
542 Bytes
Get Bonus Downloads Here.url
180 Bytes
~Get Your Files Here !/Bonus Resources.txt
70 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!