وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Ethical Hacking Gen AI/LLM/Chatbot Complete Hands on

سرفصل های دوره

Learn AI Fundamentals, OWASP Top10 LLM, Real-World Attack Case Studies, Mitigations And Hacking Labs


1. Introduction
  • 1. Course Introduction
  • 2. Teaser
  • 3. Course Content

  • 2. AI Fundamentals
  • 1.1 01 AI Fundamental.pdf
  • 1. What Is AI, LLM and Gen AI
  • 2. Understand AI And Its Benefits
  • 3. Unserstand Gen AI And Its Benefits
  • 4. What Is Prompt And How It Works

  • 3. LLM01 Prompt Injection
  • 1. Prompt Injection
  • 2. How Prompt Injection Occurs
  • 3. Prompt Injection Types
  • 4. Understand Prompt Injection - Infographics
  • 5.1 02 OWASP LLM TOP 10.pdf
  • 5. How To Prevent Prompt Injection
  • 6. Prompt Injection Lab1
  • 7. Prompt Injection Lab2
  • 8. Prompt Injection Lab3

  • 4. LLM02 Insecure Output Handling
  • 1. Insecure Output Handling
  • 2. How Insecure Output Handling Occurs
  • 3. Understand Insecure Output Handling - Infographics
  • 4. How To Prevent Insecure Output Handling
  • 5. Insecure Output Handling - Lab

  • 5. LLM03 Training Data Poisoning
  • 1. Training Data Poisoning
  • 2. How Training Data Poisoning Occurs
  • 3. Unserstand Training Data Poisoning - Infographics
  • 4. How To Prevent Training Data Poisoning
  • 5. Training Data Poisoning - Lab

  • 6. LLM04 Model Denial Of Service
  • 1. Model Denial Of Service
  • 2. How Model Denial Of Service Occurs
  • 3. Understand Model Denial Of Service - Infographics
  • 4. How To Prevent Model Denial Of Service
  • 5. Model Denial Of Service - Lab

  • 7. LLM05 Supply Chain Vulnerabilities
  • 1. Supply Chain Vulnerabilities
  • 2. How Supply Chain Vulnerabilities Occurs
  • 3. Understand Supply Chain Vulnerabilities - Infographics
  • 4. How To Prevent Supply Chain Vulnerabilities
  • 5. Supply Chain Vulnerabilities - Lab

  • 8. LLM06 Sensitive Information Disclosure
  • 1. Sensitive Information Disclosure
  • 2. How Sensitive Information Disclosure Occurs
  • 3. Understand Sensitive Information Disclosure - Infographics
  • 4. How To Prevent Sensitive Information Disclosure
  • 5. Sensitive Information Disclosure - Lab

  • 9. LLM07 Insecure Plugin Design
  • 1. Insecure Plugin Design
  • 2. How Insecure Plugin Design Occurs
  • 3. Understnad Insecure Plugin Design - Infographics
  • 4. How To Prevent Insecure Plugin Design
  • 5. Insecure Plugin Design - Lab

  • 10. LLM08 Excessive Agency
  • 1. Excessive Agency
  • 2. How Excessive Agency Occurs
  • 3. Understand Excessive Agency - Infographics
  • 4. How To Precent Excessive Agency
  • 5. Excessive Agency - Lab

  • 11. LLM09 Overreliance (Hallucination)
  • 1. Overreliance (Hallucination)
  • 2. How Overreliance (Hallucination) Occurs
  • 3. Understand Overreliance (Hallucination) - Infographics
  • 4. How To Prevent Overreliance (Hallucination)
  • 5. Overreliance (Hallucination) - Lab

  • 12. LLM10 Model Theft
  • 1. Model Theft
  • 2. How Model Theft Occurs
  • 3. Understand Model Theft - Infographics
  • 4. How To Prevent Model Theft
  • 5. Model Theft - Lab

  • 13. Wrap Up
  • 1. Whats Next
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 41089
    حجم: 1773 مگابایت
    مدت زمان: 125 دقیقه
    تاریخ انتشار: 2 آبان 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید