Udemy - Securing GenAI Systems The OWASP LLM Top Ten 2024-5
File List
- 7. Supply Chain Vulnerabilities/3. Threat and Defense.mp4 59.3 MB
- 2. Foundation Concepts/1. AI Foundations.mp4 55.4 MB
- 10. Excessive Agency/3. Threat and Defense.mp4 52.6 MB
- 9. Insecure Plugin Design/3. Threat and Defense.mp4 50.9 MB
- 5. Training Data Poisoning/3. Threat and Defense.mp4 44.9 MB
- 11. Overreliance/3. Threat and Defense.mp4 42.3 MB
- 2. Foundation Concepts/2. The OWASP LLM Top Ten.mp4 38.1 MB
- 8. Sensitive Information Disclosure/3. Threat and Defense.mp4 36.4 MB
- 6. Model Denial of Service/3. Threat and Defense.mp4 36.1 MB
- 4. Insecure Output Handling/3. Threat and Defense.mp4 32.4 MB
- 12. Model Theft/3. Threat and Defense.mp4 31.8 MB
- 3. Prompt Injection/3. Threat and Defense.mp4 29.3 MB
- 12. Model Theft/2. Understanding the Vulnerability.mp4 28.2 MB
- 3. Prompt Injection/2. Understanding the Vulnerability.mp4 21.4 MB
- 2. Foundation Concepts/3. Common Themes Across the Top Ten.mp4 20.8 MB
- 10. Excessive Agency/2. Understanding the Vulnerability.mp4 18.5 MB
- 6. Model Denial of Service/2. Understanding the Vulnerability.mp4 17.9 MB
- 8. Sensitive Information Disclosure/2. Understanding the Vulnerability.mp4 17.7 MB
- 13. Conclusion/1. Summary and Thank You.mp4 17.1 MB
- 7. Supply Chain Vulnerabilities/2. Understanding the Vulnerability.mp4 16.7 MB
- 5. Training Data Poisoning/2. Understanding the Vulnerability.mp4 14.7 MB
- 4. Insecure Output Handling/1. OWASP LLM #2 Insecure Output Handling.mp4 13.3 MB
- 9. Insecure Plugin Design/2. Understanding the Vulnerability.mp4 12.1 MB
- 3. Prompt Injection/1. OWASP LLM #1 Prompt Injection.mp4 11.3 MB
- 1. Introduction/1. Introduction.mp4 10.9 MB
- 9. Insecure Plugin Design/1. OWASP LLM #7 Insecure Plugin Design.mp4 10.9 MB
- 1. Introduction/2. Course Structure.mp4 10.7 MB
- 6. Model Denial of Service/1. OWASP LLM #4 Model Denial of Service.mp4 10.6 MB
- 4. Insecure Output Handling/2. Understanding the Vulnerability.mp4 9.8 MB
- 8. Sensitive Information Disclosure/1. OWASP LLM #6 Sensitive Information Disclosure.mp4 8.6 MB
- 11. Overreliance/2. Understanding the Vulnerability.mp4 8.4 MB
- 5. Training Data Poisoning/1. OWASP LLM #3 Training Data Poisoning.mp4 7.0 MB
- 11. Overreliance/1. OWASP LLM #9 Overreliance.mp4 6.7 MB
- 10. Excessive Agency/1. OWASP LLM #8 Excessive Agency.mp4 6.5 MB
- 12. Model Theft/1. OWASP LLM #10 Model Theft.mp4 5.8 MB
- 7. Supply Chain Vulnerabilities/1. OWASP LLM #5 Supply Chain Vulnerabilities.mp4 4.6 MB
- 1. Introduction/3. Resources.mp4 3.4 MB
- 1. Introduction/4. Ethics.mp4 2.1 MB
- 8. Sensitive Information Disclosure/1.1 Notes - Sensitive Information Disclosure.pdf 63.6 KB
- 10. Excessive Agency/1.1 Notes - Excessive Agency.pdf 59.2 KB
- 7. Supply Chain Vulnerabilities/1.1 Notes - Supply Chain Vulnerabilities.pdf 58.3 KB
- 9. Insecure Plugin Design/1.1 Notes - Insecure Plugin Design.pdf 56.5 KB
- 5. Training Data Poisoning/1.1 Notes - Poisoned Training Data.pdf 54.8 KB
- 12. Model Theft/1.1 Notes - Model Theft.pdf 53.9 KB
- 4. Insecure Output Handling/1.1 Notes - Insecure Output Handling.pdf 53.6 KB
- 6. Model Denial of Service/1.1 Notes - Model Denial of Service.pdf 51.5 KB
- 3. Prompt Injection/1.1 Notes - Prompt Injection.pdf 47.2 KB
- 11. Overreliance/1.1 Notes - Overreliance.pdf 45.3 KB
- Read me.txt 128 bytes
- 3. Prompt Injection/4. Quiz - Prompt Injection.html 120 bytes
- 4. Insecure Output Handling/4. Quiz - Insecure Output Handling.html 120 bytes
- 5. Training Data Poisoning/4. Quiz - Training Data Poisoning.html 120 bytes
- 6. Model Denial of Service/4. Quiz - Model Denial of Service.html 120 bytes
- 7. Supply Chain Vulnerabilities/4. Quiz - Supply Chain Vulnerabilities.html 120 bytes
- 8. Sensitive Information Disclosure/4. Quiz - Sensitive Information Disclosure.html 120 bytes
- 9. Insecure Plugin Design/4. Quiz - Insecure Plugin Design.html 120 bytes
- 10. Excessive Agency/4. Quiz - Excessive Agency.html 120 bytes
- 11. Overreliance/4. Quiz - Overreliance.html 120 bytes
- 12. Model Theft/4. Quiz - Model Theft.html 120 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.