Udemy - CompTIA SecAI+ CY0-001 Video Bootcamp
File List
- 9 - Evidence of an Attack and Compensating Controls for AI Systems/39. Attacks.mp4 501.6 MB
- 9 - Evidence of an Attack and Compensating Controls for AI Systems/40. Compensating Controls.mp4 158.1 MB
- 10 - AI-Enabled Tools to Facilitating Security Tasks/42. Use cases.mp4 152.4 MB
- 13 - Organizational Governance Structures that Support AI/57. AI-related Roles.mp4 146.6 MB
- 6 - Implementing Access Controls for AI Systems/27. Data Access.mp4 119.3 MB
- 11 - How AI Enables or Enhances Attack Vectors/44. Adversarial Networks.mp4 109.6 MB
- 5 - Implementing Security Controls for AI Systems/25. Guardrail Testing and Validation.mp4 107.4 MB
- 1 - AI Types and Techniques Used in Cybersecurity/2. Types of AI.mp4 99.1 MB
- 3 - Importance of AI Security/15. Validation.mp4 98.7 MB
- 10 - AI-Enabled Tools to Facilitating Security Tasks/41. Tools Applications.mp4 98.4 MB
- 3 - Importance of AI Security/12. Model Development Selection.mp4 98.0 MB
- 3 - Importance of AI Security/14. Deployment.mp4 97.8 MB
- 5 - Implementing Security Controls for AI Systems/24. Gateway Controls.mp4 96.8 MB
- 8 - Implementing Monitoring and Auditing for AI Systems/33. Log Monitoring.mp4 96.0 MB
- 3 - Importance of AI Security/17. Feedback and Iteration.mp4 93.5 MB
- 14 - Risks Associated with AI/58. Responsible AI.mp4 92.1 MB
- 3 - Importance of AI Security/13. Model Evaluation.mp4 90.7 MB
- 8 - Implementing Monitoring and Auditing for AI Systems/38. Auditing for Quality and Compliance.mp4 89.5 MB
- 6 - Implementing Access Controls for AI Systems/26. Model Access.mp4 89.4 MB
- 11 - How AI Enables or Enhances Attack Vectors/49. Automated Attack Generation.mp4 86.9 MB
- 6 - Implementing Access Controls for AI Systems/29. Network Application Programming Interface (API) Access.mp4 85.7 MB
- 11 - How AI Enables or Enhances Attack Vectors/43. AI-Generated Content (Deepfake).mp4 85.6 MB
- 6 - Implementing Access Controls for AI Systems/28. Agent Access.mp4 82.4 MB
- 2 - Importance of data security in relation to AI/5. Data Processing.mp4 80.5 MB
- 12 - Using AI to Automate Security Tasks/55. Continuous Integration and Continuous Deployment (CI CD).mp4 80.3 MB
- 1 - AI Types and Techniques Used in Cybersecurity/3. Model Training Techniques.mp4 79.3 MB
- 8 - Implementing Monitoring and Auditing for AI Systems/34. Log Sanitization.mp4 75.9 MB
- 15 - Impact of Compliance on Business Use and Development of AI/65. Corporate Policies.mp4 74.4 MB
- 7 - Implementing Data Security Controls for AI Systems/31. Data Safety.mp4 73.9 MB
- 8 - Implementing Monitoring and Auditing for AI Systems/37. AI Cost Monitoring.mp4 72.9 MB
- 14 - Risks Associated with AI/59. Risks.mp4 71.2 MB
- 13 - Organizational Governance Structures that Support AI/56. Organizational Structures.mp4 68.6 MB
- 3 - Importance of AI Security/11. Data Preparation.mp4 68.5 MB
- 5 - Implementing Security Controls for AI Systems/23. Model Controls.mp4 66.5 MB
- 1 - AI Types and Techniques Used in Cybersecurity/4. Prompt Engineering.mp4 65.8 MB
- 4 - AI Threat-Modeling Scenarios/19. Open Worldwide Application Security Project (OWASP) Top 10.mp4 63.1 MB
- 12 - Using AI to Automate Security Tasks/54. AI Agents.mp4 61.1 MB
- 3 - Importance of AI Security/18. Human-Centric AI Design Principles.mp4 60.4 MB
- 3 - Importance of AI Security/16. Monitoring and Maintenance.mp4 60.3 MB
- 12 - Using AI to Automate Security Tasks/50. Scripting Tools.mp4 56.8 MB
- 11 - How AI Enables or Enhances Attack Vectors/48. Automated Data Correlation.mp4 53.5 MB
- 7 - Implementing Data Security Controls for AI Systems/30. Encryption Requirements.mp4 52.7 MB
- 12 - Using AI to Automate Security Tasks/53. Change Management.mp4 51.5 MB
- 8 - Implementing Monitoring and Auditing for AI Systems/32. Prompt Monitoring.mp4 51.1 MB
- 3 - Importance of AI Security/10. Data Collection.mp4 49.2 MB
- 12 - Using AI to Automate Security Tasks/51. Document Synthesis and Summarization.mp4 46.3 MB
- 2 - Importance of data security in relation to AI/7. Watermarking.mp4 45.4 MB
- 8 - Implementing Monitoring and Auditing for AI Systems/35. Log Protection.mp4 45.0 MB
- 11 - How AI Enables or Enhances Attack Vectors/45. Reconnaissance.mp4 43.9 MB
- 1 - AI Types and Techniques Used in Cybersecurity/1. Introduction to CompTIA SecAI+ Certification Exam.mp4 43.8 MB
- 15 - Impact of Compliance on Business Use and Development of AI/62. Organisation for Economic Co-operation and Development (OECD) Standards.mp4 43.8 MB
- 4 - AI Threat-Modeling Scenarios/22. Common Vulnerabilities and Exposures (CVE) AI Working Group.mp4 40.6 MB
- 2 - Importance of data security in relation to AI/8. Retrieval-Augmented Generation (RAG).mp4 40.3 MB
- 11 - How AI Enables or Enhances Attack Vectors/47. Obfuscation.mp4 39.9 MB
- 3 - Importance of AI Security/9. Business Use Case.mp4 39.7 MB
- 11 - How AI Enables or Enhances Attack Vectors/46. Social Engineering.mp4 39.6 MB
- 15 - Impact of Compliance on Business Use and Development of AI/68. Recap.mp4 38.4 MB
- 2 - Importance of data security in relation to AI/6. Data Types.mp4 37.4 MB
- 15 - Impact of Compliance on Business Use and Development of AI/64. National Institute of Standards and Technology (NIST AI Risk Management (AIRMF).mp4 35.8 MB
- 15 - Impact of Compliance on Business Use and Development of AI/67. Data Sovereignty.mp4 31.2 MB
- 15 - Impact of Compliance on Business Use and Development of AI/63. ISO AI standards.mp4 30.3 MB
- 15 - Impact of Compliance on Business Use and Development of AI/66. Third-Party Compliance Evaluations.mp4 29.5 MB
- 4 - AI Threat-Modeling Scenarios/20. Massachusetts Institute of Technology (MIT) AI Risk Repository.mp4 28.2 MB
- 12 - Using AI to Automate Security Tasks/52. Incident Response Ticket Management.mp4 23.9 MB
- 8 - Implementing Monitoring and Auditing for AI Systems/36. Response Confidence Level.mp4 23.0 MB
- 15 - Impact of Compliance on Business Use and Development of AI/61. European Union (EU) AI Act.mp4 22.6 MB
- 14 - Risks Associated with AI/60. Shadow IT.mp4 17.3 MB
- 4 - AI Threat-Modeling Scenarios/21. MITRE Adversarial Threat Landscape for Artificial-Intelligence Systems (ATLAS).mp4 16.9 MB
- CompTIA SecAI+ Study Guide Exam CY0-001.epub 4.2 MB
- Full playlist.m3u 9.8 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.