Defending and Deploying AI
- Category Other
- Type Tutorials
- Language English
- Total size 3.4 GB
- Uploaded By freecoursewb
- Downloads 126
- Last checked 5 days ago
- Date uploaded 3 months ago
- Seeders 2
- Leechers 2
Infohash : 67A281A7336A5BB8CA143A74E7024AA795C6F4FE
Defending and Deploying AI
https://WebToolTip.com
Published 09/2025
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 14h 59m | Size: 3.36 GB
Overview
Your full study resource to get started with AI models and best practices for AI security.
Description
Defending and Deploying AI is your key to harnessing AI tools for enhanced cybersecurity, networking, and programming. This comprehensive course gives you the training you need to stay ahead in the rapidly evolving tech landscape. Omar Santos, a Distinguished Engineer at Cisco and recognized author and expert in AI cybersecurity, provides the knowledge you need to get up and running as well as real-world hands-on activities to help you hone your practical skills.
Files:
[ WebToolTip.com ] Defending and Deploying AI- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! AI Agents and Agentic RAG for Cybersecurity - Introduction
- 001. Introduction.en.srt (2.9 KB)
- 001. Introduction.mp4 (15.7 MB)
- 001. Summary.en.srt (2.9 KB)
- 001. Summary.mp4 (16.7 MB)
- 001. Introduction.en.srt (4.3 KB)
- 001. Introduction.mp4 (20.5 MB)
- 001. Summary.en.srt (3.9 KB)
- 001. Summary.mp4 (17.3 MB)
- Bonus Resources.txt (0.1 KB) Build Your Own AI Lab - Introduction
- 001. Introduction.en.srt (2.4 KB)
- 001. Introduction.mp4 (12.3 MB)
- 001. Summary.en.srt (1.3 KB)
- 001. Summary.mp4 (7.2 MB)
- 001. Learning objectives.en.srt (1.6 KB)
- 001. Learning objectives.mp4 (9.4 MB)
- 002. 1.1 Overview of AI Labs and Sandboxes - Home-based vs. Cloud-based.en.srt (8.9 KB)
- 002. 1.1 Overview of AI Labs and Sandboxes - Home-based vs. Cloud-based.mp4 (20.1 MB)
- 003. 1.2 Choosing the Right Hardware (GPUs, CPUs, Memory, etc.).en.srt (11.5 KB)
- 003. 1.2 Choosing the Right Hardware (GPUs, CPUs, Memory, etc.).mp4 (50.3 MB)
- 004. 1.3 Building or Buying Pre-built Systems.en.srt (5.3 KB)
- 004. 1.3 Building or Buying Pre-built Systems.mp4 (15.2 MB)
- 005. 1.4 Choosing the Operating Systems (Linux, Windows, macOS).en.srt (5.0 KB)
- 005. 1.4 Choosing the Operating Systems (Linux, Windows, macOS).mp4 (16.6 MB)
- 006. 1.5 Surveying Essential Software (Python, Anaconda, Jupyter Notebooks, and Other Frameworks).en.srt (5.6 KB)
- 006. 1.5 Surveying Essential Software (Python, Anaconda, Jupyter Notebooks, and Other Frameworks).mp4 (18.8 MB)
- 007. 1.6 Introducing Hugging Face.en.srt (4.3 KB)
- 007. 1.6 Introducing Hugging Face.mp4 (13.8 MB)
- 008. 1.7 Introducing Ollama.en.srt (3.6 KB)
- 008. 1.7 Introducing Ollama.mp4 (12.3 MB)
- 009. 1.8 Installing Ollama.en.srt (6.5 KB)
- 009. 1.8 Installing Ollama.mp4 (16.6 MB)
- 010. 1.9 Ollama Integrations.en.srt (17.6 KB)
- 010. 1.9 Ollama Integrations.mp4 (47.0 MB)
- 011. 1.10 Exploring the Ollama REST API.en.srt (3.4 KB)
- 011. 1.10 Exploring the Ollama REST API.mp4 (12.7 MB)
- 012. 1.11 Introducing Retrieval Augmented Generation (RAG).en.srt (6.5 KB)
- 012. 1.11 Introducing Retrieval Augmented Generation (RAG).mp4 (13.9 MB)
- 013. 1.12 Leveraging RAGFlow.en.srt (16.9 KB)
- 013. 1.12 Leveraging RAGFlow.mp4 (40.7 MB)
- 001. Learning objectives.en.srt (1.6 KB)
- 001. Learning objectives.mp4 (8.6 MB)
- 002. 1.1 Understanding the Significance of LLMs in the AI Landscape.en.srt (10.4 KB)
- 002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 (48.8 MB)
- 003. 1.2 Exploring the Resources for this Course - GitHub Repositories and Others.en.srt (4.6 KB)
- 003. 1.2 Exploring the Resources for this Course - GitHub Repositories and Others.mp4 (11.0 MB)
- 004. 1.3 Introducing Retrieval Augmented Generation (RAG).en.srt (18.4 KB)
- 004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 (34.0 MB)
- 005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.en.srt (8.7 KB)
- 005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 (20.9 MB)
- 006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.en.srt (8.4 KB)
- 006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 (26.4 MB)
- 007. 1.6 Understanding the NIST Taxonomy and Terminology of Attacks and Mitigations.en.srt (10.8 KB)
- 007. 1.6 Understanding the NIST Taxonomy and Terminology of Attacks and Mitigations.mp4 (21.6 MB)
- 001. Learning objectives.en.srt (3.8 KB)
- 001. Learning objectives.mp4 (18.8 MB)
- 002. 1.1 Overview of the Evolution of AI-driven Tools.en.srt (6.2 KB)
- 002. 1.1 Overview of the Evolution of AI-driven Tools.mp4 (17.6 MB)
- 003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).en.srt (12.2 KB)
- 003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).mp4 (30.0 MB)
- 004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.en.srt (8.4 KB)
- 004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.mp4 (27.2 MB)
- 005. 1.4 An Overview of Open-source AI Models and Hugging Face.en.srt (4.4 KB)
- 005. 1.4 An Overview of Open-source AI Models and Hugging Face.mp4 (17.0 MB)
- 006. 1.5 Introducing Retrieval Augmented Generation (RAG).en.srt (16.2 KB)
- 006. 1.5 Introducing Retrieval Augmented Generation (RAG).mp4 (37.7 MB)
- 007. 1.6 Introducing Embedding Models.en.srt (8.2 KB)
- 007. 1.6 Introducing Embedding Models.mp4 (39.5 MB)
- 008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.en.srt (5.4 KB)
- 008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.mp4 (17.7 MB)
- 009. 1.8 Introducing Semantic Search.en.srt (6.3 KB)
- 009. 1.8 Introducing Semantic Search.mp4 (24.5 MB)
- 001. Learning objectives.en.srt (1.5 KB)
- 001. Learning objectives.mp4 (9.1 MB)
- 002. 1.1 Introduction to Retrieval Augmented Generation (RAG).en.srt (8.5 KB)
- 002. 1.1 Introduction to Retrieval Augmented Generation (RAG).mp4 (23.0 MB)
- 003. 1.2 Exploring the GitHub Repositories and Additional Resources.en.srt (4.0 KB)
- 003. 1.2 Exploring the GitHub Repositories and Additional Resources.mp4 (12.6 MB)
- 004. 1.3 Embeddings and Embedding Models.en.srt (21.1 KB)
- 004. 1.3 Embeddings and Embedding Models.mp4 (81.4 MB)
- 005. 1.4 Indexing Techniques.en.srt (14.8 KB)
- 005. 1.4 Indexing Techniques.mp4 (34.3 MB)
- 006. 1.5 Vector Databases.en.srt (7.4 KB)
- 006. 1.5 Vector Databases.mp4 (19.4 MB)
- 007. 1.6 Chunking Strategies.en.srt (11.4 KB)
- 007. 1.6 Chunking Strategies.mp4 (35.5 MB)
- 008. 1.7 RAG vs. Fine-tuning.en.srt (16.3 KB)
- 008. 1.7 RAG vs. Fine-tuning.mp4 (48.9 MB)
- 009. 1.8 RAG, RAG Fusion, and RAPTOR.en.srt (13.4 KB)
- 009. 1.8 RAG, RAG Fusion, and RAPTOR.mp4 (29.1 MB)
- 010. 1.9 Running Open Weight Models with Ollama.en.srt (18.9 KB)
- 010. 1.9 Running Open Weight Models with Ollama.mp4 (62.8 MB)
- 011. 1.10 Exploring Open WebUI and Other Ollama Plugins.en.srt (13.9 KB)
- 011. 1.10 Exploring Open WebUI and Other Ollama Plugins.mp4 (49.8 MB)
- 012. 1.11 Introduction to AI Agents and Agentic Implementations.en.srt (7.4 KB)
- 012. 1.11 Introduction to AI Agents and Agentic Implementations.mp4 (18.4 MB)
- 013. 1.12 Introduction to Agentic RAG.en.srt (6.8 KB)
- 013. 1.12 Introduction to Agentic RAG.mp4 (17.9 MB)
- 014. 1.13 Introducing the Model Context Protocol (MCP).en.srt (16.5 KB)
- 014. 1.13 Introducing the Model Context Protocol (MCP).mp4 (49.0 MB)
- 015. 1.14 Introducing A2A and AGNTCY.en.srt (22.7 KB)
- 015. 1.14 Introducing A2A and AGNTCY.mp4 (67.0 MB)
- 001. Learning objectives.en.srt (0.5 KB)
- 001. Learning objectives.mp4 (3.8 MB)
- 002. 2.1 Advantages and Disadvantages of Cloud AI Labs and Sandboxes.en.srt (10.3 KB)
- 002. 2.1 Advantages and Disadvantages of Cloud AI Labs and Sandboxes.mp4 (19.1 MB)
- 003. 2.2 Introducing Amazon Bedrock.en.srt (8.6 KB)
- 003. 2.2 Introducing Amazon Bedrock.mp4 (21.0 MB)
- 004. 2.3 Surveying Amazon SageMaker.en.srt (15.3 KB)
- 004. 2.3 Surveying Amazon SageMaker.mp4 (36.3 MB)
- 005. 2.4 Exploring Google Vertex AI.en.srt (16.8 KB)
- 005. 2.4 Exploring Google Vertex AI.mp4 (43.4 MB)
- 006. 2.5 Using Microsoft Azure AI Foundry.en.srt (11.5 KB)
- 006. 2.5 Using Microsoft Azure AI Foundry.mp4 (36.3 MB)
- 007. 2.6 Discussing Cost Management and Security.en.srt (8.2 KB)
- 007. 2.6 Discussing Cost Management and Security.mp4 (21.5 MB)
- 008. 2.7 Using Terraform to Deploy Ollama in the Cloud.en.srt (4.2 KB)
- 008. 2.7 Using Terraform to Deploy Ollama in the Cloud.mp4 (10.4 MB)
- 001. Learning objectives.en.srt (1.1 KB)
- 001. Learning objectives.mp4 (6.7 MB)
- 002. 2.1 Introducing LangChain.en.srt (5.9 KB)
- 002. 2.1 Introducing LangChain.mp4 (18.1 MB)
- 003. 2.2 LangChain vs. LlamaIndex.en.srt (5.4 KB)
- 003. 2.2 LangChain vs. LlamaIndex.mp4 (21.0 MB)
- 004. 2.3 Prompt templates and system prompts.en.srt (17.8 KB)
- 004. 2.3 Prompt templates and system prompts.mp4 (74.2 MB)
- 005. 2.4 Introducing LangSmith.en.srt (8.0 KB)
- 005. 2.4 Introducing LangSmith.mp4 (24.7 MB)
- 001. Learning objectives.en.srt (1.3 KB)
- 001. Learning objectives.mp4 (6.6 MB)
- 002. 2.1 Defining Prompt Injection Attacks.en.srt (17.4 KB)
- 002. 2.1 Defining Prompt Injection Attacks.mp4 (66.1 MB)
- 003. 2.2 Exploring Real-life Prompt Injection Attacks.en.srt (5.6 KB)
- 003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 (17.2 MB)
- 004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.en.srt (15.2 KB)
- 004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 (38.2 MB)
- 005. 2.4 Enforcing Privilege Control on LLM Access to Backend Systems.en.srt (8.4 KB)
- 005. 2.4 Enforcing Privilege Control on LLM Access to Backend Systems.mp4 (15.9 MB)
- 006. 2.5 Best Practices Around API Tokens for Plugins, Data Access, and Function-level Permissions.en.srt (4.1 KB)
- 006. 2.5 Best Practices Around API Tokens for Plugins, Data Access, and Function-level Permissions.mp4 (10.2 MB)
- 007. 2.6 Understanding Insecure Output Handling Attacks.en.srt (4.8 KB)
- 007. 2.6 Understanding Insecure Output Handling Attacks.mp4 (8.4 MB)
- 008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.en.srt (6.8 KB)
- 008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 (20.0 MB)
- 001. Learning objectives.en.srt (2.0 KB)
- 001. Learning objectives.mp4 (9.6 MB)
- 002. 2.1 Accelerating Network Security Tasks with AI.en.srt (7.4 KB)
- 002. 2.1 Accelerating Network Security Tasks with AI.mp4 (16.1 MB)
- 003. 2.2 Prompt Engineering for Cybersecurity.en.srt (3.8 KB)
- 003. 2.2 Prompt Engineering for Cybersecurity.mp4 (11.3 MB)
- 004. 2.3 Securing AI Implementations.en.srt (20.7 KB)
- 004. 2.3 Securing AI Implementations.mp4 (63.1 MB)
- 005. 2.4 Exploring Network Security Processes Incorporating AI Tools.en.srt (11.7 KB)
- 005. 2.4 Exploring Network Security Processes Incorporating AI Tools.mp4 (31.9 MB)
- 001. Learning objectives.en.srt (0.7 KB)
- 001. Learning objectives.mp4 (4.5 MB)
- 002. 3.1 Using Hybrid AI Labs - Combining Home and Cloud Resources.en.srt (2.5 KB)
- 002. 3.1 Using Hybrid AI Labs - Combining Home and Cloud Resources.mp4 (5.9 MB)
- 003. 3.2 Synchronizing Data and Projects.en.srt (5.2 KB)
- 003. 3.2 Synchronizing Data and Projects.mp4 (11.2 MB)
- 004. 3.3 Leveraging the Strengths of Both Environments.en.srt (6.8 KB)
- 004. 3.3 Leveraging the Strengths of Both Environments.mp4 (19.5 MB)
- 005. 3.4 Running Open-Source Models Available on Hugging Face.en.srt (5.4 KB)
- 005. 3.4 Running Open-Source Models Available on Hugging Face.mp4 (14.2 MB)
- 006. 3.5 Introducing LangChain.en.srt (3.8 KB)
- 006. 3.5 Introducing LangChain.mp4 (9.2 MB)
- 007. 3.6 Introducing LlamaIndex.en.srt (2.6 KB)
- 007. 3.6 Introducing LlamaIndex.mp4 (7.5 MB)
- 008. 3.7 Understanding Embedding Models.en.srt (7.5 KB)
- 008. 3.7 Understanding Embedding Models.mp4 (32.0 MB)
- 009. 3.8 Using Vector Databases.en.srt (6.1 KB)
- 009. 3.8 Using Vector Databases.mp4 (17.4 MB)
- 001. Learning objectives.en.srt (1.2 KB)
- 001. Learning objectives.mp4 (6.7 MB)
- 002. 3.1 Mastering Prompt Engineering.en.srt (4.9 KB)
- 002. 3.1 Mastering Prompt Engineering.mp4 (16.1 MB)
- 003. 3.2 Exploring Basic Prompt Chain Examples.en.srt (12.0 KB)
- 003. 3.2 Exploring Basic Prompt Chain Examples.mp4 (47.2 MB)
- 004. 3.3 Creating Prompt Branching Chains.en.srt (14.7 KB)
- 004. 3.3 Creating Prompt Branching Chains.mp4 (56.8 MB)
- 005. 3.4 Exploring Parallel PromptChains.en.srt (9.1 KB)
- 005. 3.4 Exploring Parallel PromptChains.mp4 (42.2 MB)
- 006. 3.5 Creating a Basic RAG Application.en.srt (17.6 KB)
- 006. 3.5 Creating a Basic RAG Application.mp4 (69.8 MB)
- 007. 3.6 Creating a Complete RAG Application.en.srt (4.8 KB)
- 007. 3.6 Creating a Complete RAG Application.mp4 (17.7 MB)
- 001. Learning objectives.en.srt (0.9 KB)
- 001. Learning objectives.mp4 (4.9 MB)
- 002. 3.1 Understanding Training Data Poisoning Attacks.en.srt (6.7 KB)
- 002. 3.1 Understanding Training Data Poisoning Attacks.mp4 (21.8 MB)
- 003. 3.2 Exploring Model Denial of Service Attacks.en.srt (4.3 KB)
- 003. 3.2 Exploring Model Denial of Service Attacks.mp4 (9.9 MB)
- 004. 3.3 Understanding the Risks of the AI and ML Supply Chain.en.srt (13.5 KB)
- 004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 (36.3 MB)
- 005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.en.srt (18.8 KB)
- 005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 (52.4 MB)
- 006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environme.mp4 (67.9 MB)
- 006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environme.srt (22.7 KB)
- 001. Learning objectives.en.srt (2.9 KB)
- 001. Learning objectives.mp4 (14.4 MB)
- 002. 3.1 Exploring How AI is Revolutionizing Software Development.en.srt (3.2 KB)
- 002. 3.1 Exploring How AI is Revolutionizing Software Development.mp4 (11.7 MB)
- 003. 3.2 Surveying GitHub Copilot, Cursor, and Cody.en.srt (3.1 KB)
- 003. 3.2 Surveying GitHub Copilot, Cursor, and Cody.mp4 (7.6 MB)
- 004. 3.3 Exploring the CODEX Model.en.srt (1.7 KB)
- 004. 3.3 Exploring the CODEX Model.mp4 (3.6 MB)
- 005. 3.4 Generating Code from a Prompt.en.srt (7.7 KB)
- 005. 3.4 Generating Code from a Prompt.mp4 (21.0 MB)
- 006. 3.5 Explaining Existing Code.en.srt (4.1 KB)
- 006. 3.5 Explaining Existing Code.mp4 (13.0 MB)
- 007. 3.6 Generating Comments.en.srt (5.5 KB)
- 007. 3.6 Generating Comments.mp4 (14.5 MB)
- 008. 3.7 Prompt Engineering for Software Development.en.srt (12.4 KB)
- 008. 3.7 Prompt Engineering for Software Development.mp4 (29.6 MB)
- 001. Learning objectives.en.srt (1.1 KB)
- 001. Learning objectives.mp4 (6.2 MB)
- 002. 4.1 Introduction to AI Agent Frameworks.en.srt (7.0 KB)
- 002. 4.1 Introduction to AI Agent Frameworks.mp4 (19.1 MB)
- 003. 4.2 Surveying CrewAI.en.srt (9.8 KB)
- 003. 4.2 Surveying CrewAI.mp4 (24.5 MB)
- 004. 4.3 Introducing LangGraph.en.srt (2.7 KB)
- 004. 4.3 Introducing LangGraph.mp4 (10.1 MB)
- 005. 4.4 Exploring Examples of LangGraph in Action.en.srt (18.9 KB)
- 005. 4.4 Exploring Examples of LangGraph in Action.mp4 (86.6 MB)
- 006. 4.5 Exploring an Example of Agents with MCP Servers.en.srt (15.3 KB)
- 006. 4.5 Exploring an Example of Agents with MCP Servers.mp4 (59.3 MB)
- 007. 4.6 Securing Agentic Implementations.en.srt (13.5 KB)
- 007. 4.6 Securing Agentic Implementations.mp4 (37.3 MB)
- 001. Learning objectives.en.srt (0.6 KB)
- 001. Learning objectives.mp4 (3.7 MB)
- 002. 4.1 Leveraging LangSmith and LangGraph.en.srt (5.8 KB)
- 002. 4.1 Leveraging LangSmith and LangGraph.mp4 (14.7 MB)
- 003. 4.2 Using Fine Tuning Frameworks.en.srt (6.2 KB)
- 003. 4.2 Using Fine Tuning Frameworks.mp4 (17.1 MB)
- 004. 4.3 High-Performance Computing and Edge AI.en.srt (4.7 KB)
- 004. 4.3 High-Performance Computing and Edge AI.mp4 (11.8 MB)
- 001. Learning objectives.en.srt (1.3 KB)
- 001. Learning objectives.mp4 (6.5 MB)
- 002. 4.1 Understanding Sensitive Information Disclosure.en.srt (4.2 KB)
- 002. 4.1 Understanding Sensitive Information Disclosure.mp4 (18.1 MB)
- 003. 4.2 Exploiting Insecure Plugin Design.en.srt (4.3 KB)
- 003. 4.2 Exploiting Insecure Plugin Design.mp4 (12.1 MB)
- 004. 4.3 Avoiding Excessive Agency.en.srt (5.2 KB)
- 004. 4.3 Avoiding Excessive Agency.mp4 (14.9 MB)
- 001. Learning objectives.en.srt (1.4 KB)
- 001. Learning objectives.mp4 (6.7 MB)
- 002. 4.1 Exploring how AI is Revolutionizing Networking.en.srt (11.9 KB)
- 002. 4.1 Exploring how AI is Revolutionizing Networking.mp4 (25.7 MB)
- 003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.en.srt (9.2 KB)
- 003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.mp4 (22.7 MB)
- 004. 4.3 Exploring AI Models for Networking Use Cases.en.srt (3.0 KB)
- 004. 4.3 Exploring AI Models for Networking Use Cases.mp4 (7.5 MB)
- 005. 4.4 Prompt Engineering for Networking.en.srt (9.1 KB)
- 005. 4.4 Prompt Engineering for Networking.mp4 (22.6 MB)
- 001. Learning objectives.en.srt (1.4 KB)
- 001. Learning objectives.mp4 (7.0 MB)
- 002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.en.srt (8.1 KB)
- 002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.mp4 (16.2 MB)
- 003. 5.2 Regulatory and Policy Frameworks.en.srt (7.8 KB)
- 003. 5.2 Regulatory and Policy Frameworks.mp4 (21.9 MB)
- 004. 5.3 Staying Updated on Advancements in AI and Cybersecurity.en.srt (5.5 KB)
- 004. 5.3 Staying Updated on Advancements in AI and Cybersecurity.mp4 (13.9 MB)
- 001. Learning objectives.en.srt (0.9 KB)
- 001. Learning objectives.mp4 (4.5 MB)
- 002. 5.1 Understanding Overreliance.en.srt (7.3 KB)
- 002. 5.1 Understanding Overreliance.mp4 (21.2 MB)
- 003. 5.2 Exploring Model Theft Attacks.en.srt (7.0 KB)
- 003. 5.2 Exploring Model Theft Attacks.mp4 (16.5 MB)
- 004. 5.3 Understanding Red Teaming of AI Models.en.srt (19.2 KB)
- 004. 5.3 Understanding Red Teaming of AI Models.mp4 (49.1 MB)
- 001. Learning objectives.en.srt (1.4 KB)
- 001. Learning objectives.mp4 (6.8 MB)
- 002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.en.srt (25.1 KB)
- 002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 (60.2 MB)
- 003. 6.2 Securing Embedding Models.en.srt (14.0 KB)
- 003. 6.2 Securing Embedding Models.mp4 (29.3 MB)
- 004. 6.3 Securing Vector Databases.en.srt (17.7 KB)
- 004. 6.3 Securing Vector Databases.mp4 (41.7 MB)
- 005. 6.4 Monitoring and Incident Response.en.srt (11.1 KB)
- 005. 6.4 Monitoring and Incident Response.mp4 (23.4 MB)
- 001. Introduction.en.srt (4.0 KB)
- 001. Introduction.mp4 (18.8 MB)
- 001. Summary.en.srt (2.2 KB)
- 001. Summary.mp4 (10.6 MB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce