~Get Your Files Here !/7 - MITRE ATLAS Mapping for LLM Attacks/2 -Mapping AI Threats with MITRE ATLAS OpenAI vs. DeepSeek Case Study.mp4 156.0 MB
~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/3 -Hands-On Demo Exploiting an Insecure Ollama API Setup.mp4 135.0 MB
~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/6 -Mitigating OLAMA API Risks with NGINX Authentication (Hands-On Demo).mp4 81.1 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/9 -How Self-Attention Builds Rich Contextual Understanding in Transformers.mp4 72.5 MB
~Get Your Files Here !/5 - OWASP Top 10 for LLMs Understanding AI-Specific Security Risks/2 -OWASP Top 10 Risks for LLMs + Case Study Mapping.mp4 52.7 MB
~Get Your Files Here !/8 - Hands-On Lab Exploiting AI Decisions in LLM APIs/2 -Lab Demo – Exploiting LLM APIs with Excessive Agency (PortSwigger).mp4 49.4 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/9 -Scenario 2 Deep Dive into LLM Attack Surfaces from the Provider Side.mp4 48.5 MB
~Get Your Files Here !/3 - Anatomy of an LLM System and Its Security Attack Surface/6 -LLM Processing Unit Explained Inference Handling, Prompt Cntrl & Runtime Logic.mp4 45.0 MB
~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/4 -Ollama in the Wild Real-World Exposure via Shodan + Developer Risk Behavior.mp4 44.9 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/11 -Inference and Log Data Exposure DeepSeek’s AI Leak Case Study.mp4 42.7 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/6 -Understanding Recurrent Neural Networks (RNNs) for Language Processing.mp4 40.8 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/10 -Training Data Poisoning Case Study How Microsoft Tay Was Manipulated on Twitter.mp4 37.5 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/11 -Summary of Transformer Innovations Key Concepts Behind LLMs.mp4 30.9 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/14 -Section 3 Wrap-Up LLM Attack Surface Lessons + What’s Next with OWASP Top 10.mp4 30.3 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/8 -Prompt Injection Demonstration How a $1 Chevy Tahoe Chatbot Reply Went Viral.mp4 29.8 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/7 -How Transformers and LLMs Revolutionized Language Processing.mp4 27.6 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/12 -LLM Model Exposure How Misconfigured Ollama APIs Opened the Door.mp4 27.5 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/3 -Where Large Language Models Fit in the Generative AI Landscape.mp4 26.8 MB
~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/7 -How One Misconfigured LLM API Triggers Multiple OWASP Risks.mp4 26.7 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/7 -Scenario 1 LLM Attack Surfaces in Organizations Using AI Models.mp4 26.5 MB
[TutsNode.com] - REST API Security-Basic Auth, JWT, OAuth 2.0, OIDC, MFA,HMAC/12. Using JWT for Microservices/4. Authors API Secured with JWT.mp4 117.3 MB