Udemy - Artificial Intelligence and ChatGPT for Cyber Security 2024

Photo unavailable
Category:
Date:
01/11/24 at 5:43am GMT+1
Submitter:
Seeders:
14
Leechers:
2
File size:
3.8 GB in 98 files

Torrent Status:
  This torrent has been verified.

Infohash:
bd0e634472fecb9ee7dc09b14743c556364fb103


File list

  • Udemy - Artificial Intelligence and ChatGPT for Cyber Security 2024
  • icon ~Get Your Files Here !/1. Introduction To The Course/1. How To Follow This Course .mp4 49.2 MB
    icon ~Get Your Files Here !/1. Introduction To The Course/2. [AP] Google Collab.mp4 20.9 MB
    icon ~Get Your Files Here !/1. Introduction To The Course/3. [AP] How to create a copy of a workbook.mp4 7.3 MB
    icon ~Get Your Files Here !/10. Conclusion and Next Steps/1. Thanks For Watching The Course!.html 204 B
    icon ~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/1. Evolution Of Cyber Security.mp4 104.8 MB
    icon ~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/2. Categories Of Cyber Attacks.mp4 117.5 MB
    icon ~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/3. Security Policies and Procedures.mp4 73.1 MB
    icon ~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/4. Cyber Security Tools and Technologies.mp4 119.7 MB
    icon ~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/5. Understanding Cyber Security Certifications.mp4 56.3 MB
    icon ~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/6. Cyber Security Best Practices.mp4 76.7 MB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/1. What, Why, How Of This Section.html 1.2 KB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/10. [AP] Exercise Finding patterns in log files.mp4 3.1 MB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/10.1 log_sec_cyber.txt 58.7 KB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/11. [AP] Exercise Solution.mp4 66.8 MB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/12. [AP] How to protect personal and company data when using ChatGPT.mp4 24.1 MB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/2. [AP] What is Prompt Engineering in Generative AI.mp4 30.9 MB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/2.1 Introduction to Prompt Engineering.pdf 28.1 KB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/3. [AP] How to use Few Shot Prompting to achieve better ChatGPT responses.mp4 29.9 MB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/3.1 Few shot prompting.pdf 32.4 KB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/4. [AP] Using Chain Of Thought Prompting to get more detailed and quality response.mp4 35.8 MB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/4.1 Chain of though prompting.pdf 30.8 KB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/5. [AP] Exercise Analyzing log files with ChatGPT4.mp4 7.5 MB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/5.1 cybersecurity_logs.txt 371 B
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/6. [AP] Exercise Solution.mp4 9.7 MB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/7. [AP] How to create Custom Instructions.mp4 22.5 MB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/7.1 Introduction to Prompt Engineering.pdf 28.1 KB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/8. [AP] How to use Generative AI for data summerization.mp4 17.3 MB
    icon ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/9. [AP] Advanced ChatGPT Techniques.mp4 67.6 MB
    icon ~Get Your Files Here !/3. New Age Of Social Engineering/1. What, Why, How Of This Section.html 1018 B
    icon ~Get Your Files Here !/3. New Age Of Social Engineering/2. [AT] What Is Social Engineering .mp4 105.7 MB
    icon ~Get Your Files Here !/3. New Age Of Social Engineering/3. [APT] Voice Cloning With ElevenLabs.mp4 50.8 MB
    icon ~Get Your Files Here !/3. New Age Of Social Engineering/3.1 ElevenLabs AI.html 83 B
    icon ~Get Your Files Here !/3. New Age Of Social Engineering/4. [APT] AI Voice Generating With Resemble.mp4 9.5 MB
    icon ~Get Your Files Here !/3. New Age Of Social Engineering/4.1 Resemble AI.html 85 B
    icon ~Get Your Files Here !/3. New Age Of Social Engineering/5. [APT] Creating Deepfakes With D-ID.mp4 40.2 MB
    icon ~Get Your Files Here !/3. New Age Of Social Engineering/5.1 D-ID.html 82 B
    icon ~Get Your Files Here !/3. New Age Of Social Engineering/6. [APT] Using ChatGPT To Write Emails In My Style.mp4 20.1 MB
    icon ~Get Your Files Here !/3. New Age Of Social Engineering/6.1 S3L5 - Writing Emails in style of....txt 1012 B
    icon ~Get Your Files Here !/3. New Age Of Social Engineering/7. [APT] How To Recognize These Type Of Scams.mp4 89.3 MB
    icon ~Get Your Files Here !/3. New Age Of Social Engineering/8. Quiz.html 166 B
    icon ~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/1. What, Why, How Of This Section.html 1.3 KB
    icon ~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/2. [AT] What are AI Based SIEM Systems.mp4 93.9 MB
    icon ~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/3. [AT] Is there a Firewall With AI.mp4 82.6 MB
    icon ~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/4. [AT] How to use AI for Email Filtering.mp4 66.1 MB
    icon ~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/5. [AT] AI In Identity And Access Management.mp4 94.9 MB
    icon ~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/6. [AT] IDSIPS With AI.mp4 119.2 MB
    icon ~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/7. Quiz.html 166 B
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/1. What, Why, How Of This Section.html 1.3 KB
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/10. [AP] Intuition lecture K Nearest Neighbors (KNN) algorithm.mp4 93.8 MB
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/11. [AP] Training KNN algorithm to detect spam emails.mp4 44.4 MB
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/12. [AP] Creating Spam Detection system using OpenAI API and GPT-4.mp4 103 MB
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/12.1 API Docs.html 102 B
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/12.2 OpenAI API Blog.html 95 B
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/12.3 OpenAI API Key dashboard.html 97 B
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/13. Quiz.html 166 B
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/2. [AT] Introduction To Email Security And Filtering.mp4 89.4 MB
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/3. [AT] What Are Spam Filters And How Do They Work .mp4 88.4 MB
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/4. [AP] Introduction to the Email Spam detection AI system.mp4 20 MB
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/4.1 Dataset.html 124 B
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/4.2 Download dataset without Kaggle account.html 143 B
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/4.3 Workbook.html 146 B
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/5. [AP] How to load data and work with different data source files.mp4 56.8 MB
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/6. [AP] Analyzing email spam dataset.mp4 93.3 MB
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/7. [AP] How to analyze and work with text data.mp4 50 MB
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/8. [AP] How to clean and prepare text data for AIML.mp4 58.1 MB
    icon ~Get Your Files Here !/5. Building An Email Filtering System With AI/9. [AP] How to transform email data from text to numbers - Vectorization.mp4 79.5 MB
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/1. What, Why, How Of This Section.html 1.7 KB
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/10. Quiz.html 166 B
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/2. [AT] What is Phishing in the cyber-world.mp4 46.8 MB
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/3. [AT] How To Recognize And Prevent Phishing Attacks.mp4 68 MB
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/4. [AP] Loading and understanding Phishing dataset.mp4 54.5 MB
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/4.1 Dataset.html 143 B
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/4.2 Phishing_Legitimate_full 2.csv 1.3 MB
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/4.3 Workbook.html 146 B
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/5. [AP] Analyzing Phishing data.mp4 48.7 MB
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/6. [AP] Preparing dataset for machine learningAI.mp4 13.6 MB
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/7. [AP] Intuition lecture Decision Trees algorithm.mp4 62.6 MB
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/8. [AP] Training Random Forest Algorithm to recognize Phishing websites.mp4 16.7 MB
    icon ~Get Your Files Here !/6. Building A Phishing Detection System With AI/9. [AP] How to check the AI system performance - Precision and Recall.mp4 71.4 MB
    icon ~Get Your Files Here !/7. AI In Network Security/1. What, Why, How Of This Section.html 1 KB
    icon ~Get Your Files Here !/7. AI In Network Security/2. [AT] Introduction To Network Security.mp4 139.1 MB
    icon ~Get Your Files Here !/7. AI In Network Security/3. [AP] Understanding Network Anomaly dataset.mp4 75.6 MB
    icon ~Get Your Files Here !/7. AI In Network Security/3.1 Dataset - Kaggle.html 129 B
    icon ~Get Your Files Here !/7. AI In Network Security/3.2 Test dataset - no Kaggle needed.html 143 B
    icon ~Get Your Files Here !/7. AI In Network Security/3.3 Train dataset - no Kaggle needed.html 143 B
    icon ~Get Your Files Here !/7. AI In Network Security/3.4 Workbook.html 146 B
    icon ~Get Your Files Here !/7. AI In Network Security/4. [AP] Preparing network anomaly dataset - part 1.mp4 55.9 MB
    icon ~Get Your Files Here !/7. AI In Network Security/5. [AP] Preparing network anomaly dataset - part 2.mp4 69.8 MB
    icon ~Get Your Files Here !/7. AI In Network Security/6. [AP] Intuition lecture Logistic Regression algorithm.mp4 57.2 MB
    icon ~Get Your Files Here !/7. AI In Network Security/7. [AP] Training Logistic Regression For Network Monitoring.mp4 23.4 MB
    icon ~Get Your Files Here !/7. AI In Network Security/8. [AP] How to improve an MLAI algorithm - Hyperparameter Optimization.mp4 38.6 MB
    icon ~Get Your Files Here !/7. AI In Network Security/9. Quiz.html 166 B
    icon ~Get Your Files Here !/8. AI For Malware Detection/1. What, Why, How Of This Section.html 1.2 KB
    icon ~Get Your Files Here !/8. AI For Malware Detection/2. [AT] What Is Malware & Different Types Of Malware.mp4 80.9 MB
    icon ~Get Your Files Here !/8. AI For Malware Detection/3. [AT] How Traditional Systems For Malware Detection work.mp4 96 MB
    icon ~Get Your Files Here !/8. AI For Malware Detection/4. [AP] Loading and analyzing Malware Dataset.mp4 28.1 MB
    icon ~Get Your Files Here !/8. AI For Malware Detection/4.1 Dataset.html 120 B
    icon ~Get Your Files Here !/8. AI For Malware Detection/4.2 Malware full dataset - no Kaggle account needed.html 143 B

Similar Torrents