Udemy - Intro to LLM Security - OWASP Top 10 for Large Language M...

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 1.3 GB
  • Uploaded By freecoursewb
  • Downloads 227
  • Last checked 1 month ago
  • Date uploaded 1 month ago
  • Seeders 21
  • Leechers 29

Infohash : 4E8ACEEE5D3467C16E16513AD501A1DF4C1D0F73



Intro to LLM Security - OWASP Top 10 for Large Language Mode

https://WebToolTip.com

Published 11/2025
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 3h 11m | Size: 1.31 GB

Securing the AI Revolution: Defense-in-Depth for Large Language Models

What you'll learn
The AI Threat Landscape: Understand the Rise of LLMs and New Attack Surfaces that differ fundamentally from traditional web application security.
The Blueprint for Defense: Master the OWASP Top 10 for LLM Applications and learn to assess risks based on Prevalence, Exploitability, and Impact.
Secure Foundations: Integrate LLM security into the Secure Development Lifecycle (SDLC) with a practical Whiteboard Solution for risk analysis and mitigation
The #1 Risk: Deep dive into LLM01: Prompt Injection and distinguish between direct and indirect attacks.
Strategic Layering: Implement a robust Defense-in-Depth architecture tailored for LLMs.
Vector Database Security: Understand the emerging threats and best practices for LLM08: Vector and Embedding Weaknesses.
Protecting Your Secrets: Implement controls against LLM02: Sensitive Information Disclosure and prevent model over-sharing.

Requirements
No Pre Requirements

Files:

[ WebToolTip.com ] Udemy - Intro to LLM Security - OWASP Top 10 for Large Language Mode
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1 - Module 1 Introduction to LLM Security and the OWASP Top 10
    • 1 - Introduction.mp4 (23.6 MB)
    • 2 - Content Download - Download Course Content.url (0.1 KB)
    • 2 - Content Download.mp4 (2.0 MB)
    • 2 -Download Course Content.url (0.1 KB)
    • 3 - Module One Overview.mp4 (6.0 MB)
    • 4 - The Rise of LLMs and New Attack Surfaces.mp4 (61.9 MB)
    • 5 - What is the OWASP Top 10 for LLM Applications.mp4 (89.3 MB)
    • 6 - Prioritizing Risk Prevalence, Exploitability, and Impact.mp4 (37.8 MB)
    • 7 - Secure Development Lifecycle (SDLC) for LLM Applications.mp4 (54.0 MB)
    • 8 - Whiteboard Solution - Analyze and mitigate risk in your LLM applications.mp4 (86.3 MB)
    • 9 - Module Review Summary.mp4 (11.5 MB)
    2 - Module 2 The Critical Input and Output Vulnerabilities
    • 1 - Module Two Overview.mp4 (13.8 MB)
    • 2 - Understanding IO Vulnerabilities.mp4 (24.4 MB)
    • 3 - LLM01 Prompt Injection (The #1 Risk).mp4 (54.6 MB)
    • 4 - LLM05 Improper Output Handling.mp4 (37.8 MB)
    • 5 - LLM07 System Prompt Leakage.mp4 (55.5 MB)
    • 6 - Whiteboard - Prompt Injection Scenario.mp4 (27.7 MB)
    • 7 - Module Review Summary.mp4 (17.8 MB)
    3 - Module 3 Data, Model, and Supply Chain Risks
    • 1 - Module Three Overview.mp4 (8.8 MB)
    • 2 - Understanding Data, Model and Supply Chain Risks.mp4 (24.8 MB)
    • 3 - LLM02 Sensitive Information Disclosure.mp4 (48.5 MB)
    • 4 - LLM04 Data and Model Poisoning.mp4 (26.6 MB)
    • 5 - LLM03 Supply Chain Vulnerabilities.mp4 (53.7 MB)
    • 6 - Whiteboard Solution - Supply Chains.mp4 (67.4 MB)
    • 7 - Module Review Summary.mp4 (9.6 MB)
    4 - Module 4 Runtime, Control, and Operational Issues
    • 1 - Module Four Overview.mp4 (6.1 MB)
    • 2 - Understanding Runtime, Control and Operational Issues.mp4 (15.1 MB)
    • 3 - LLM06 Excessive Agency.mp4 (30.4 MB)
    • 4 - LLM09 Misinformation and Overreliance.mp4 (21.8 MB)
    • 5 - LLM10 Unbounded Consumption.mp4 (47.5 MB)
    • 6 - LLM08 Vector and Embedding Weaknesses.mp4 (26.4 MB)
    • 7 - Module Review Summary.mp4 (24.7 MB)
    5 - Module 5 Risk Management and Operational Security
    • 1 - Module Five Overview.mp4 (7.4 MB)
    • 10 - Resources and Closeout.mp4 (14.8 MB)
    • 2 - Defense in Depth.mp4 (60.0 MB)
    • 3 - Risk Management.mp4 (43.4 MB)
    • 4 - AI Lifecycle.mp4 (33.4 MB)
    • 5 - NIST AI Lifecycle.mp4 (55.5 MB)
    • 6 - LLM Security Testing.mp4 (40.7 MB)
    • 7 - Operational Security for AIML.mp4 (35.5 MB)
    • 8 - The Future of LLM Security and Emerging Threats.mp4 (23.1 MB)
    • 9 - Module Review Summary.mp4 (15.1 MB)
    • Bonus Resources.txt (0.1 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce
REVERSE-PROXY 🔄 RP (success) | 1828ms 📄 torrent 🕐 16 Jan 2026, 03:56:40 pm IST ⏰ 10 Feb 2026, 03:56:40 pm IST ✅ Valid for 24d 23h 🔄 Wait 10m