MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

[ FreeCourseWeb.com ] Udemy - Pentesting GenAI LLM models - Securing Large Language Models

磁力链接/BT种子名称

[ FreeCourseWeb.com ] Udemy - Pentesting GenAI LLM models - Securing Large Language Models

磁力链接/BT种子简介

种子哈希:a8a594d902dfa3bc51dc72089ab10948ee9566ea
文件大小: 1.61G
已经下载:1299次
下载速度:极快
收录时间:2025-05-23
最近下载:2025-12-20

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:A8A594D902DFA3BC51DC72089AB10948EE9566EA
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 小蓝俱乐部 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 母狗园 51动漫 91短视频 抖音Max 海王TV TikTok成人版 PornHub 暗网Xvideo 草榴社区 哆哔涩漫 呦乐园 萝莉岛 搜同 91暗网

最近搜索

漂亮的妹妹+韩国 private amateur dpg n1133 漂亮大奶少妇+骚货在商场试衣间光屁屁竟然开始了时装表演+身材不错 2460-1003专操极品良家大神『zsir8901』 大陆同志片 快手 绝命毒师 hnd-755 史诗大电影 魔法 korean vxt 扫黑风暴 ntrh-009 pred-804 动画 中文 vk 暗网 绝世容颜 《雪中悍屌行》大屌悍刀狂操美人 1642000 淫荡小表妹 被大鸡吧无套输出高潮中抽搐 小学 波波姐 白日露出 流欲xx工坊 牺牲青竹 蒙古语

文件列表

  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/14 -ATT&CK Enterprise Matrix - Hands-On.mp4 210.3 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/2 -Indirect Prompt Injection Demo.mp4 128.3 MB
  • ~Get Your Files Here !/5 - Red Teaming for LLMs/1 -Red Teaming LLMs Five Key Techniques.mp4 113.1 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/4 -Insecure Output Handling Demo.mp4 93.8 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/4 -ATT&CK Tactics.mp4 77.2 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/2 -Understanding the Pyramid of Pain.mp4 58.9 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/6 -ATT&CK Subtechniques.mp4 45.3 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/6 -Model Denial of Service (DoS).mp4 44.4 MB
  • ~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/3 -LLM Application Vulnerabilities - Demo 02 (Biased and Stereotypes).mp4 41.1 MB
  • ~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/4 -LLM Application Vulnerabilities - Demo 03 (Sensitive Data Disclosure).mp4 39.1 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/12 -Overreliance.mp4 37.3 MB
  • ~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/6 -LLM Application Vulnerabilities - Demo - 05 (Hallucination).mp4 35.5 MB
  • ~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/5 -Post-Exploitation.mp4 33.1 MB
  • ~Get Your Files Here !/2 - Introduction to LLM Security & Penetration Testing/1 -What is Penetration Testing.mp4 33.0 MB
  • ~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/1 -Why Penetration Testing is Essential for GenAI.mp4 31.8 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/9 -Sensitive Information Disclosure.mp4 31.6 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/5 -ATT&CK Techniques.mp4 31.1 MB
  • ~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/2 -Comparing Red Teaming and Penetration Testing.mp4 29.0 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/11 -Excessive Agency.mp4 28.7 MB
  • ~Get Your Files Here !/6 - Reporting & Mitigation Strategies/2 -Remediation and Reporting.mp4 28.5 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/3 -Insecure Output Handling Theory.mp4 27.9 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/8 -Training Data Poisoning.mp4 27.8 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/1 -What is ATT&CK.mp4 26.0 MB
  • ~Get Your Files Here !/1 - Introduction/1 -Introduction and Course resource.mp4 24.6 MB
  • ~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/3 -Penetration Testing Process.mp4 24.3 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/5 -Supply Chain Vulnerabilities.mp4 23.8 MB
  • ~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/2 -LLM Application Vulnerabilities - Demo 01 (Code Explanation).mp4 23.5 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/12 -Campaigns Overview.mp4 23.1 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/10 -Plugin Security LLM Applications.mp4 22.1 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/9 -Implementing Mitigation Techniques.mp4 21.3 MB
  • ~Get Your Files Here !/4 - Penetration Testing & Red Teaming Fundamentals/4 -Exploitation.mp4 21.1 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/10 -Exploring ATT&CK Groups.mp4 21.0 MB
  • ~Get Your Files Here !/2 - Introduction to LLM Security & Penetration Testing/2 -Why LLMs Are Vulnerable.mp4 20.0 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/1 -Prompt Injection.mp4 19.0 MB
  • ~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/8 -Strategies for LLM Application Safety.mp4 18.8 MB
  • ~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/7 -Foundation Models vs. LLM Apps.mp4 18.5 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/8 -Detection Strategies.mp4 18.4 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/7 -Stop Model DOS Attack.mp4 17.3 MB
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/13 -Model Theft.mp4 16.8 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/11 -Software in the ATT&CK Framework.mp4 16.4 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/7 -Data Sources for ATT&CK.mp4 16.1 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/13 -ATT&CK Relationships.mp4 15.8 MB
  • ~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/1 -Why Benchmarks Are Not Enough AI Safety & Security.mp4 15.1 MB
  • ~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/9 -Examining LLM Vulnerabilities.mp4 15.0 MB
  • ~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/5 -LLM Application Vulnerabilities - Demo 04 (Service Disruption).mp4 13.1 MB
  • ~Get Your Files Here !/7 - MITRE ATT&CK Framework for LLMs/3 -Overview of ATT&CK Matrices.mp4 11.6 MB
  • ~Get Your Files Here !/1 - Introduction/1 -LLM PENTEST.pptx 11.1 MB
  • ~Get Your Files Here !/6 - Reporting & Mitigation Strategies/1 -Reporting.mp4 10.9 MB
  • ~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/11 -Importing the LLM Application.mp4 7.7 MB
  • ~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/10 -Demo LLM Application Overview.mp4 7.1 MB
  • ~Get Your Files Here !/3 - Overview of LLM Vulnerabilities/2 -Ai Application vulnerabilities.ipynb 14.4 kB
  • ~Get Your Files Here !/9 - Conclusion/1 - Bonus lecture.html 6.4 kB
  • ~Get Your Files Here !/9 - Conclusion/1 - About your certificate.html 964 Bytes
  • Get Bonus Downloads Here.url 183 Bytes
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/4 -Insecure Output Handling Lab Access.url 119 Bytes
  • ~Get Your Files Here !/8 - LLM Application Vulnerabilities/2 -Indirect Prompt Injection Lab Access.url 101 Bytes
  • ~Get Your Files Here !/Bonus Resources.txt 70 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!