Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Ethical Hacking against and with AI/LLM/ML Training Course

Posted By: lucky_aut
Ethical Hacking against and with AI/LLM/ML Training Course

Ethical Hacking against and with AI/LLM/ML Training Course
Published 3/2024
Duration: 3h24m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 1.74 GB
Genre: eLearning | Language: English

Become professional in AI and LLM Penetration Testing and Vulnerability Discovery


What you'll learn
AI/LLM vulnerabilities
get to a professional level in AI/LLM penetration testing
get to a professional level in AI/LLM bug bounty
Basics of AI/LLM
AI/LLM Attacks
AI/LLM Frameworks
AI/LLM Prompt Injection
AI/LLM Insecure Output Handling
AI/LLM Training Data Poisoning
AI/LLM Denial of Service
AI/LLM Supply Chain
AI/LLM Permission Issues
AI/LLM Data Leakage
AI/LLM Excessive Agency
AI/LLM Overreliance
AI/LLM Insecure Plugins
AI/LLM Threat Model
Using AI for Penetration Testing / Ethical Hacking
The Yolo AI Tool



Requirements
Computer with a minimum of 4GB ram/memory
Operating System: Windows / Apple Mac OS / Linux
Reliable internet connection
Burp Suite (Community or Pro)
Firefox Web Browser
Instance of Kali Linux (Raspberry PI, VM, Virtualbox etc.)

Description
Ethical Hacking against and with AI/LLM/ML Training Course
Welcome to this course of Ethical Hacking and Penetration Testing Artificial Intelligence (AI) and Large Language Models (LLM) Training course.
Important note: This course is NOT teaching the actual usage of Burp Suite and its features.
Your instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.
This course has a both theory and practical lab sections with a focus on finding and exploiting vulnerabilities in AI and LLM systems and applications. The training is aligned with the OWASP Top 10 LLM vulnerability classes. Martin is solving all the LLM labs from Portswigger in addition to a lot of other labs and showcases. The videos are easy to follow along and replicate. There is also a dedicate section on how to use AI for Penetration Testing / Bug Bounty Hunting and Ethical Hacking.
The course features the following:
· AI/LLM Introduction
· AI/LLM Attacks
· AI/LLM Frameworks / writeups
· AI LLM01: Prompt Injection
· AI LLM02: Insecure Output Handling
· AI LLM03: Training Data Poisoning
· AI LLM04: Denial of Service
· AI LLM05: Supply Chain
· AI LLM06: Permission Issues
· AI LLM07: Data Leakage
· AI LLM08: Excessive Agency
· AI LLM09: Overreliance
· AI LLM10: Insecure Plugins
· Threat Model
· Putting it all together
· Using AI for Penetration Testing / Ethical Hacking
· The Yolo AI Tool
Notes & Disclaimer
Portswigger labs are a public and a free service from Portswigger for anyone to use to sharpen their skills. All you need is to sign up for a free account. I will update this course with new labs as they are published. I will to respond to questions in a reasonable time frame. Learning Pen Testing / Bug Bounty Hunting is a lengthy process, so please don’t feel frustrated if you don’t find a bug right away. Try to use Google, read Hacker One reports and research each feature in-depth. This course is for educational purposes only. This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack.
Who this course is for:
Anybody interested in becoming professional in ethical AI/LLM hacking / penetration testing
Anybody interested in becoming professional in ethical AI/LLM bug bounty hunting
Anybody interested in learning how hackers hack AI/LLM
Developers looking to expand on their knowledge of vulnerabilities that may impact them
Anyone interested in AI/LLM security
Anyone interested in Red teaming
Anyone interested in offensive security

More Info