17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Artificial Intelligence And ChatGPT For Cyber Security 2024
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Artificial Intelligence & ChatGPT for Cyber Security 2024
https://DevCourseWeb.com
Published 1/2024 Created by Luka Anicin,Aleksa Tamburkovski MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 76 Lectures ( 6h 29m ) | Size: 3.94 GB
Master Cyber Security/Ethical Hacking With Artificial Intelligence - Implement, Uncover Risks and Navigate The AI Era
What you'll learn: Learn ChatGPT for Cyber Security Learn Prompt Engineering Use Advanced ChatGPT functionality Implement Bypassing ChatGPT filters Learn Social Engineering with Artificial Intelligence Create a Voice Clone with AI Create Deepfake Videos For Social Engineering with AI Learn AI Based SIEM Learn AI Based Firewalls Learn Email Filtering with AI Learn AI In Identity and Access Management Build an Email Filtering System with AI and Python Build a Phishing detection system with AI and Python Implement Artificial Intelligence in Network Security Using Logistic Regression Algorithm for Network Monitoring Create Malware Detection system with AI and Python Learn Decision Trees Algorithm Learn K-Nearest Neighbors Algorithm KNN Learn Data Poisoning Attack Cover Data Bias Vulnerability Learn Model Vulnerabilities Cover Ethical Concerns of Artificial Intelligence and ChatGPT Learn Basics of Cyber Security Learn Basics of Artificial Intelligence Learn Basics of Python Programming
Requirements: No Programming Knowledge or Cyber Security and AI Knowledge is required. We cover everything from scratch! A computer(Windows/Linux/Mac) with internet connection Python programming is required - However we have an Appendix on Python for those who need to refresh their skills
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Introduction To The Course/1. How To Follow This Course .mp4
49.2 MB
~Get Your Files Here !/1. Introduction To The Course/2. [AP] Google Collab.mp4
20.9 MB
~Get Your Files Here !/1. Introduction To The Course/3. [AP] How to create a copy of a workbook.mp4
7.3 MB
~Get Your Files Here !/10. Conclusion and Next Steps/1. Thanks For Watching The Course!.html
204 B
~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/1. Evolution Of Cyber Security.mp4
104.8 MB
~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/2. Categories Of Cyber Attacks.mp4
117.5 MB
~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/3. Security Policies and Procedures.mp4
73.1 MB
~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/4. Cyber Security Tools and Technologies.mp4
119.7 MB
~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/5. Understanding Cyber Security Certifications.mp4
56.3 MB
~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/6. Cyber Security Best Practices.mp4
76.7 MB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/1. What, Why, How Of This Section.html
1.2 KB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/10. [AP] Exercise Finding patterns in log files.mp4
3.1 MB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/10.1 log_sec_cyber.txt
58.7 KB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/11. [AP] Exercise Solution.mp4
66.8 MB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/12. [AP] How to protect personal and company data when using ChatGPT.mp4
24.1 MB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/2. [AP] What is Prompt Engineering in Generative AI.mp4
30.9 MB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/2.1 Introduction to Prompt Engineering.pdf
28.1 KB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/3. [AP] How to use Few Shot Prompting to achieve better ChatGPT responses.mp4
29.9 MB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/3.1 Few shot prompting.pdf
32.4 KB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/4. [AP] Using Chain Of Thought Prompting to get more detailed and quality response.mp4
35.8 MB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/4.1 Chain of though prompting.pdf
30.8 KB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/5. [AP] Exercise Analyzing log files with ChatGPT4.mp4
7.5 MB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/5.1 cybersecurity_logs.txt
371 B
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/6. [AP] Exercise Solution.mp4
9.7 MB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/7. [AP] How to create Custom Instructions.mp4
22.5 MB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/7.1 Introduction to Prompt Engineering.pdf
28.1 KB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/8. [AP] How to use Generative AI for data summerization.mp4
17.3 MB
~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/9. [AP] Advanced ChatGPT Techniques.mp4
67.6 MB
~Get Your Files Here !/3. New Age Of Social Engineering/1. What, Why, How Of This Section.html
1018 B
~Get Your Files Here !/3. New Age Of Social Engineering/2. [AT] What Is Social Engineering .mp4
105.7 MB
~Get Your Files Here !/3. New Age Of Social Engineering/3. [APT] Voice Cloning With ElevenLabs.mp4
50.8 MB
~Get Your Files Here !/3. New Age Of Social Engineering/3.1 ElevenLabs AI.html
83 B
~Get Your Files Here !/3. New Age Of Social Engineering/4. [APT] AI Voice Generating With Resemble.mp4
9.5 MB
~Get Your Files Here !/3. New Age Of Social Engineering/4.1 Resemble AI.html
85 B
~Get Your Files Here !/3. New Age Of Social Engineering/5. [APT] Creating Deepfakes With D-ID.mp4
40.2 MB
~Get Your Files Here !/3. New Age Of Social Engineering/5.1 D-ID.html
82 B
~Get Your Files Here !/3. New Age Of Social Engineering/6. [APT] Using ChatGPT To Write Emails In My Style.mp4
20.1 MB
~Get Your Files Here !/3. New Age Of Social Engineering/6.1 S3L5 - Writing Emails in style of....txt
1012 B
~Get Your Files Here !/3. New Age Of Social Engineering/7. [APT] How To Recognize These Type Of Scams.mp4
89.3 MB
~Get Your Files Here !/3. New Age Of Social Engineering/8. Quiz.html
166 B
~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/1. What, Why, How Of This Section.html
1.3 KB
~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/2. [AT] What are AI Based SIEM Systems.mp4
93.9 MB
~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/3. [AT] Is there a Firewall With AI.mp4
82.6 MB
~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/4. [AT] How to use AI for Email Filtering.mp4
66.1 MB
~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/5. [AT] AI In Identity And Access Management.mp4
94.9 MB
~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/6. [AT] IDSIPS With AI.mp4
119.2 MB
~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/7. Quiz.html
166 B
~Get Your Files Here !/5. Building An Email Filtering System With AI/1. What, Why, How Of This Section.html
1.3 KB
~Get Your Files Here !/5. Building An Email Filtering System With AI/10. [AP] Intuition lecture K Nearest Neighbors (KNN) algorithm.mp4
93.8 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/11. [AP] Training KNN algorithm to detect spam emails.mp4
44.4 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/12. [AP] Creating Spam Detection system using OpenAI API and GPT-4.mp4
103 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/12.1 API Docs.html
102 B
~Get Your Files Here !/5. Building An Email Filtering System With AI/12.2 OpenAI API Blog.html
95 B
~Get Your Files Here !/5. Building An Email Filtering System With AI/12.3 OpenAI API Key dashboard.html
97 B
~Get Your Files Here !/5. Building An Email Filtering System With AI/13. Quiz.html
166 B
~Get Your Files Here !/5. Building An Email Filtering System With AI/2. [AT] Introduction To Email Security And Filtering.mp4
89.4 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/3. [AT] What Are Spam Filters And How Do They Work .mp4
88.4 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/4. [AP] Introduction to the Email Spam detection AI system.mp4
20 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/4.1 Dataset.html
124 B
~Get Your Files Here !/5. Building An Email Filtering System With AI/4.2 Download dataset without Kaggle account.html
143 B
~Get Your Files Here !/5. Building An Email Filtering System With AI/4.3 Workbook.html
146 B
~Get Your Files Here !/5. Building An Email Filtering System With AI/5. [AP] How to load data and work with different data source files.mp4
56.8 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/6. [AP] Analyzing email spam dataset.mp4
93.3 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/7. [AP] How to analyze and work with text data.mp4
50 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/8. [AP] How to clean and prepare text data for AIML.mp4
58.1 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/9. [AP] How to transform email data from text to numbers - Vectorization.mp4
79.5 MB
~Get Your Files Here !/6. Building A Phishing Detection System With AI/1. What, Why, How Of This Section.html
1.7 KB
~Get Your Files Here !/6. Building A Phishing Detection System With AI/10. Quiz.html
166 B
~Get Your Files Here !/6. Building A Phishing Detection System With AI/2. [AT] What is Phishing in the cyber-world.mp4
46.8 MB
~Get Your Files Here !/6. Building A Phishing Detection System With AI/3. [AT] How To Recognize And Prevent Phishing Attacks.mp4
68 MB
~Get Your Files Here !/6. Building A Phishing Detection System With AI/4. [AP] Loading and understanding Phishing dataset.mp4
54.5 MB
~Get Your Files Here !/6. Building A Phishing Detection System With AI/4.1 Dataset.html
143 B
~Get Your Files Here !/6. Building A Phishing Detection System With AI/4.2 Phishing_Legitimate_full 2.csv
1.3 MB
~Get Your Files Here !/6. Building A Phishing Detection System With AI/4.3 Workbook.html
146 B
~Get Your Files Here !/6. Building A Phishing Detection System With AI/5. [AP] Analyzing Phishing data.mp4
48.7 MB
~Get Your Files Here !/6. Building A Phishing Detection System With AI/6. [AP] Preparing dataset for machine learningAI.mp4
13.6 MB
~Get Your Files Here !/6. Building A Phishing Detection System With AI/7. [AP] Intuition lecture Decision Trees algorithm.mp4
62.6 MB
~Get Your Files Here !/6. Building A Phishing Detection System With AI/8. [AP] Training Random Forest Algorithm to recognize Phishing websites.mp4
16.7 MB
~Get Your Files Here !/6. Building A Phishing Detection System With AI/9. [AP] How to check the AI system performance - Precision and Recall.mp4
71.4 MB
~Get Your Files Here !/7. AI In Network Security/1. What, Why, How Of This Section.html
1 KB
~Get Your Files Here !/7. AI In Network Security/2. [AT] Introduction To Network Security.mp4
139.1 MB
~Get Your Files Here !/7. AI In Network Security/3. [AP] Understanding Network Anomaly dataset.mp4
75.6 MB
~Get Your Files Here !/7. AI In Network Security/3.1 Dataset - Kaggle.html
129 B
~Get Your Files Here !/7. AI In Network Security/3.2 Test dataset - no Kaggle needed.html
143 B
~Get Your Files Here !/7. AI In Network Security/3.3 Train dataset - no Kaggle needed.html
143 B
~Get Your Files Here !/7. AI In Network Security/3.4 Workbook.html
146 B
~Get Your Files Here !/7. AI In Network Security/4. [AP] Preparing network anomaly dataset - part 1.mp4
55.9 MB
~Get Your Files Here !/7. AI In Network Security/5. [AP] Preparing network anomaly dataset - part 2.mp4
69.8 MB
~Get Your Files Here !/7. AI In Network Security/6. [AP] Intuition lecture Logistic Regression algorithm.mp4
57.2 MB
~Get Your Files Here !/7. AI In Network Security/7. [AP] Training Logistic Regression For Network Monitoring.mp4
23.4 MB
~Get Your Files Here !/7. AI In Network Security/8. [AP] How to improve an MLAI algorithm - Hyperparameter Optimization.mp4
38.6 MB
~Get Your Files Here !/7. AI In Network Security/9. Quiz.html
166 B
~Get Your Files Here !/8. AI For Malware Detection/1. What, Why, How Of This Section.html
1.2 KB
~Get Your Files Here !/8. AI For Malware Detection/2. [AT] What Is Malware & Different Types Of Malware.mp4
80.9 MB
~Get Your Files Here !/8. AI For Malware Detection/3. [AT] How Traditional Systems For Malware Detection work.mp4
96 MB
~Get Your Files Here !/8. AI For Malware Detection/4. [AP] Loading and analyzing Malware Dataset.mp4
28.1 MB
~Get Your Files Here !/8. AI For Malware Detection/4.1 Dataset.html
120 B
~Get Your Files Here !/8. AI For Malware Detection/4.2 Malware full dataset - no Kaggle account needed.html