搜索
[ FreeCourseWeb.com ] Udemy - Pentesting GenAI LLM models - Securing Large Language Models
磁力链接/BT种子名称
[ FreeCourseWeb.com ] Udemy - Pentesting GenAI LLM models - Securing Large Language Models
磁力链接/BT种子简介
种子哈希:
a8a594d902dfa3bc51dc72089ab10948ee9566ea
文件大小:
1.61G
已经下载:
893
次
下载速度:
极快
收录时间:
2025-05-11
最近下载:
2025-08-29
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:A8A594D902DFA3BC51DC72089AB10948EE9566EA
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
她趣
TikTok成人版
PornHub
听泉鉴鲍
草榴社区
哆哔涩漫
呦乐园
萝莉岛
最近搜索
女友 内射
有钱大神
virtualporn
打炮
姐姐 人前
好姐第
红粉
transformers rise of the beasts 2023
叶月
initiala
户外主播
机后入
護
口交集合
各路
感謝
收费房
露逼舞
圆圆
骚母
大奶妇
情侣 酒店
【360】
小九
上吊
,子
摄影大师
毛子哥
香水
大肥臀
文件列表
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/14 -ATT&CK Enterprise Matrix - Hands-On.mp4
210.3 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/2 -Indirect Prompt Injection Demo.mp4
128.3 MB
~Get Your Files Here !/5 - Red Teaming for LLMs/1 -Red Teaming LLMs Five Key Techniques.mp4
113.1 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/4 -Insecure Output Handling Demo.mp4
93.8 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/4 -ATT&CK Tactics.mp4
77.2 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/2 -Understanding the Pyramid of Pain.mp4
58.9 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/6 -ATT&CK Subtechniques.mp4
45.3 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/6 -Model Denial of Service (DoS).mp4
44.4 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/3 -LLM Application Vulnerabilities - Demo 02 (Biased and Stereotypes).mp4
41.1 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/4 -LLM Application Vulnerabilities - Demo 03 (Sensitive Data Disclosure).mp4
39.1 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/12 -Overreliance.mp4
37.3 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/6 -LLM Application Vulnerabilities - Demo - 05 (Hallucination).mp4
35.5 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/5 -Post-Exploitation.mp4
33.1 MB
~Get Your Files Here !/2 - Introduction to LLM Security & Penetration Testing/1 -What is Penetration Testing.mp4
33.0 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/1 -Why Penetration Testing is Essential for GenAI.mp4
31.8 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/9 -Sensitive Information Disclosure.mp4
31.6 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/5 -ATT&CK Techniques.mp4
31.1 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/2 -Comparing Red Teaming and Penetration Testing.mp4
29.0 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/11 -Excessive Agency.mp4
28.7 MB
~Get Your Files Here !/6 - Reporting & Mitigation Strategies/2 -Remediation and Reporting.mp4
28.5 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/3 -Insecure Output Handling Theory.mp4
27.9 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/8 -Training Data Poisoning.mp4
27.8 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/1 -What is ATT&CK.mp4
26.0 MB
~Get Your Files Here !/1 - Introduction/1 -Introduction and Course resource.mp4
24.6 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/3 -Penetration Testing Process.mp4
24.3 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/5 -Supply Chain Vulnerabilities.mp4
23.8 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/2 -LLM Application Vulnerabilities - Demo 01 (Code Explanation).mp4
23.5 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/12 -Campaigns Overview.mp4
23.1 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/10 -Plugin Security LLM Applications.mp4
22.1 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/9 -Implementing Mitigation Techniques.mp4
21.3 MB
~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/4 -Exploitation.mp4
21.1 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/10 -Exploring ATT&CK Groups.mp4
21.0 MB
~Get Your Files Here !/2 - Introduction to LLM Security & Penetration Testing/2 -Why LLMs Are Vulnerable.mp4
20.0 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/1 -Prompt Injection.mp4
19.0 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/8 -Strategies for LLM Application Safety.mp4
18.8 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/7 -Foundation Models vs. LLM Apps.mp4
18.5 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/8 -Detection Strategies.mp4
18.4 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/7 -Stop Model DOS Attack.mp4
17.3 MB
~Get Your Files Here !/8 - LLM Application Vulnerabilities/13 -Model Theft.mp4
16.8 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/11 -Software in the ATT&CK Framework.mp4
16.4 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/7 -Data Sources for ATT&CK.mp4
16.1 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/13 -ATT&CK Relationships.mp4
15.8 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/1 -Why Benchmarks Are Not Enough AI Safety & Security.mp4
15.1 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/9 -Examining LLM Vulnerabilities.mp4
15.0 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/5 -LLM Application Vulnerabilities - Demo 04 (Service Disruption).mp4
13.1 MB
~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/3 -Overview of ATT&CK Matrices.mp4
11.6 MB
~Get Your Files Here !/1 - Introduction/1 -LLM PENTEST.pptx
11.1 MB
~Get Your Files Here !/6 - Reporting & Mitigation Strategies/1 -Reporting.mp4
10.9 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/11 -Importing the LLM Application.mp4
7.7 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/10 -Demo LLM Application Overview.mp4
7.1 MB
~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/2 -Ai Application vulnerabilities.ipynb
14.4 kB
~Get Your Files Here !/9 - Conclusion/1 - Bonus lecture.html
6.4 kB
~Get Your Files Here !/9 - Conclusion/1 - About your certificate.html
964 Bytes
Get Bonus Downloads Here.url
183 Bytes
~Get Your Files Here !/8 - LLM Application Vulnerabilities/4 -Insecure Output Handling Lab Access.url
119 Bytes
~Get Your Files Here !/8 - LLM Application Vulnerabilities/2 -Indirect Prompt Injection Lab Access.url
101 Bytes
~Get Your Files Here !/Bonus Resources.txt
70 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!