وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Ethical Hacking Gen AI/LLM/Chatbot Complete Hands on

سرفصل های دوره

Learn AI Fundamentals, OWASP Top10 LLM, Real-World Attack Case Studies, Mitigations And Hacking Labs


1. Introduction
  • 1. Course Introduction
  • 2. Teaser
  • 3. Course Content

  • 2. AI Fundamentals
  • 1.1 01 AI Fundamental.pdf
  • 1. What Is AI, LLM and Gen AI
  • 2. Understand AI And Its Benefits
  • 3. Unserstand Gen AI And Its Benefits
  • 4. What Is Prompt And How It Works

  • 3. LLM01 Prompt Injection
  • 1. Prompt Injection
  • 2. How Prompt Injection Occurs
  • 3. Prompt Injection Types
  • 4. Understand Prompt Injection - Infographics
  • 5.1 02 OWASP LLM TOP 10.pdf
  • 5. How To Prevent Prompt Injection
  • 6. Prompt Injection Lab1
  • 7. Prompt Injection Lab2
  • 8. Prompt Injection Lab3

  • 4. LLM02 Insecure Output Handling
  • 1. Insecure Output Handling
  • 2. How Insecure Output Handling Occurs
  • 3. Understand Insecure Output Handling - Infographics
  • 4. How To Prevent Insecure Output Handling
  • 5. Insecure Output Handling - Lab

  • 5. LLM03 Training Data Poisoning
  • 1. Training Data Poisoning
  • 2. How Training Data Poisoning Occurs
  • 3. Unserstand Training Data Poisoning - Infographics
  • 4. How To Prevent Training Data Poisoning
  • 5. Training Data Poisoning - Lab

  • 6. LLM04 Model Denial Of Service
  • 1. Model Denial Of Service
  • 2. How Model Denial Of Service Occurs
  • 3. Understand Model Denial Of Service - Infographics
  • 4. How To Prevent Model Denial Of Service
  • 5. Model Denial Of Service - Lab

  • 7. LLM05 Supply Chain Vulnerabilities
  • 1. Supply Chain Vulnerabilities
  • 2. How Supply Chain Vulnerabilities Occurs
  • 3. Understand Supply Chain Vulnerabilities - Infographics
  • 4. How To Prevent Supply Chain Vulnerabilities
  • 5. Supply Chain Vulnerabilities - Lab

  • 8. LLM06 Sensitive Information Disclosure
  • 1. Sensitive Information Disclosure
  • 2. How Sensitive Information Disclosure Occurs
  • 3. Understand Sensitive Information Disclosure - Infographics
  • 4. How To Prevent Sensitive Information Disclosure
  • 5. Sensitive Information Disclosure - Lab

  • 9. LLM07 Insecure Plugin Design
  • 1. Insecure Plugin Design
  • 2. How Insecure Plugin Design Occurs
  • 3. Understnad Insecure Plugin Design - Infographics
  • 4. How To Prevent Insecure Plugin Design
  • 5. Insecure Plugin Design - Lab

  • 10. LLM08 Excessive Agency
  • 1. Excessive Agency
  • 2. How Excessive Agency Occurs
  • 3. Understand Excessive Agency - Infographics
  • 4. How To Precent Excessive Agency
  • 5. Excessive Agency - Lab

  • 11. LLM09 Overreliance (Hallucination)
  • 1. Overreliance (Hallucination)
  • 2. How Overreliance (Hallucination) Occurs
  • 3. Understand Overreliance (Hallucination) - Infographics
  • 4. How To Prevent Overreliance (Hallucination)
  • 5. Overreliance (Hallucination) - Lab

  • 12. LLM10 Model Theft
  • 1. Model Theft
  • 2. How Model Theft Occurs
  • 3. Understand Model Theft - Infographics
  • 4. How To Prevent Model Theft
  • 5. Model Theft - Lab

  • 13. Wrap Up
  • 1. Whats Next
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 41089
    حجم: 1773 مگابایت
    مدت زمان: 125 دقیقه
    تاریخ انتشار: ۲ آبان ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید