Это пробный урок. Оформите подписку, чтобы получить доступ ко всем материалам курса. Премиум

  1. Урок 1. 00:04:33
    Introduction
  2. Урок 2. 00:08:55
    The Correct Path
  3. Урок 3. 00:16:01
    Kali Linux Install
  4. Урок 4. 00:05:43
    Simple ChatGPT Prompts
  5. Урок 5. 00:24:54
    Good vs. Bad Prompt Full Network Recon
  6. Урок 6. 00:17:37
    Few-Shot Prompting Downgrading Aggressive Commands and Analyzing Logs
  7. Урок 7. 00:07:05
    Assessment of Privilege Escalation Avenues with ChatGPT
  8. Урок 8. 00:06:19
    Confirming and Prioritizing Web Vulnerabilities
  9. Урок 9. 00:06:01
    Writing Rules for SQL Injection and Analyzing Apache Logs for SQLi
  10. Урок 10. 00:07:24
    Hardening SSH Configuration File
  11. Урок 11. 00:04:31
    Prompt Injection & Jailbreak
  12. Урок 12. 00:11:44
    Gandalf Prompt Injection Lab
  13. Урок 13. 00:15:07
    Indirect Prompt Injection
  14. Урок 14. 00:07:28
    Loading Guardrails for Prompt Injection
  15. Урок 15. 00:05:28
    PenTest++ Theory
  16. Урок 16. 00:30:02
    Performing AI Augmented Pentest
  17. Урок 17. 00:13:18
    OpenAI API and ShellGPT
  18. Урок 18. 00:13:35
    Automating Entire Attacks with ShellGPT
  19. Урок 19. 00:12:02
    ShellGPT for Recon, Payload Creation and Vulnerability Analysis
  20. Урок 20. 00:03:19
    Python and ML for Cybersecurity and Ethical Hackers
  21. Урок 21. 00:09:10
    Installing ML Libraries for Malicious IP Activity Detector
  22. Урок 22. 00:14:00
    Predicting New Entries in Our Malicious Activity Detector
  23. Урок 23. 00:10:10
    Malicious Bash Command Detector with Random Forest Classifier
  24. Урок 24. 00:06:40
    Flagging Command as Negative & Positive
  25. Урок 25. 00:12:17
    Implementing OpenAI Api Key In Python Recon Programs
  26. Урок 26. 00:14:29
    Summarizing PDFs with LLM for Reconnaissance
  27. Урок 27. 00:11:55
    Creating a Simple AI Attacker Agent
  28. Урок 28. 00:03:37
    Introduction to MITRE ATLAS
  29. Урок 29. 00:07:27
    Creating AI Digit Image Classifier Model
  30. Урок 30. 00:27:37
    Exploiting the Model
  31. Урок 31. 00:06:12
    Mapping Vulnerability to MITRE ATLAS and Writing Report
  32. Урок 32. 00:02:57
    Exercise: Imposter Syndrome
  33. Урок 33. 00:16:37
    Creating Tools for Our Agent
  34. Урок 34. 00:05:23
    Initializing Our Agent
  35. Урок 35. 00:14:08
    Testing Our Agent
  36. Урок 36. 00:08:46
    Using AI For SQL Injection
  37. Урок 37. 00:04:27
    AI Generated Reverse Shell
  38. Урок 38. 00:10:24
    Using AI for Exploit Development and Fuzzing
  39. Урок 39. 00:06:28
    Using AI for XSS (Cross-Site Scripting) Attacks
  40. Урок 40. 00:07:30
    What is Social Engineering and Phishing
  41. Урок 41. 00:10:10
    Voice Cloning with ElevenLabs
  42. Урок 42. 00:02:41
    AI Voice Generating with Resemble
  43. Урок 43. 00:05:10
    Creating Deepfakes with D-ID
  44. Урок 44. 00:05:56
    How To Recognize these Types of Scams
  45. Урок 45. 00:06:20
    AI Based SIEM (Security Information and Event Management) Systems
  46. Урок 46. 00:06:07
    Firewalls with AI
  47. Урок 47. 00:04:42
    Email Filtering With AI
  48. Урок 48. 00:06:15
    AI in IAM (Identity and Access Management)
  49. Урок 49. 00:08:01
    IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) with AI
  50. Урок 50. 00:04:47
    Data Poisoning
  51. Урок 51. 00:04:11
    Data Bias
  52. Урок 52. 00:06:53
    Model Vulnerabilities
  53. Урок 53. 00:04:31
    Ethical Concerns
  54. Урок 54. 00:01:18
    Thank You!