[ DevCourseWeb.com ] Udemy - Artificial Intelligence and ChatGPT for Cyber Security 2024


File Information

File Size:   3.94 GB
Creat Time:   2024-08-19
Active Degree:   25
Last Active:   2024-11-25
Magnet Link:    Magnet LinkMagnet Link
Statement:   This site does not provide download links, only text displays, and does not contain any infringement.

File List

  1. ~Get Your Files Here !/7. AI In Network Security/2. [AT] Introduction To Network Security.mp4 142.46 MB
  2. ~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/4. Cyber Security Tools and Technologies.mp4 122.59 MB
  3. ~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/6. [AT] IDSIPS With AI.mp4 122.09 MB
  4. ~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/2. Categories Of Cyber Attacks.mp4 120.37 MB
  5. ~Get Your Files Here !/3. New Age Of Social Engineering/2. [AT] What Is Social Engineering .mp4 108.24 MB
  6. ~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/1. Evolution Of Cyber Security.mp4 107.28 MB
  7. ~Get Your Files Here !/9. AI Security Risks/4. [AT] What are general AI Model Vulnerabilities.mp4 105.51 MB
  8. ~Get Your Files Here !/5. Building An Email Filtering System With AI/12. [AP] Creating Spam Detection system using OpenAI API and GPT-4.mp4 105.50 MB
  9. ~Get Your Files Here !/8. AI For Malware Detection/3. [AT] How Traditional Systems For Malware Detection work.mp4 98.31 MB
  10. ~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/5. [AT] AI In Identity And Access Management.mp4 97.16 MB
  11. ~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/2. [AT] What are AI Based SIEM Systems.mp4 96.18 MB
  12. ~Get Your Files Here !/5. Building An Email Filtering System With AI/10. [AP] Intuition lecture K Nearest Neighbors (KNN) algorithm.mp4 96.00 MB
  13. ~Get Your Files Here !/5. Building An Email Filtering System With AI/6. [AP] Analyzing email spam dataset.mp4 95.56 MB
  14. ~Get Your Files Here !/5. Building An Email Filtering System With AI/2. [AT] Introduction To Email Security And Filtering.mp4 91.59 MB
  15. ~Get Your Files Here !/3. New Age Of Social Engineering/7. [APT] How To Recognize These Type Of Scams.mp4 91.45 MB
  16. ~Get Your Files Here !/5. Building An Email Filtering System With AI/3. [AT] What Are Spam Filters And How Do They Work .mp4 90.55 MB
  17. ~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/3. [AT] Is there a Firewall With AI.mp4 84.57 MB
  18. ~Get Your Files Here !/8. AI For Malware Detection/2. [AT] What Is Malware & Different Types Of Malware.mp4 82.88 MB
  19. ~Get Your Files Here !/5. Building An Email Filtering System With AI/9. [AP] How to transform email data from text to numbers - Vectorization.mp4 81.41 MB
  20. ~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/6. Cyber Security Best Practices.mp4 78.55 MB
  21. ~Get Your Files Here !/7. AI In Network Security/3. [AP] Understanding Network Anomaly dataset.mp4 77.39 MB
  22. ~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/3. Security Policies and Procedures.mp4 74.80 MB
  23. ~Get Your Files Here !/9. AI Security Risks/2. [AT] What is Data Poisoning.mp4 74.37 MB
  24. ~Get Your Files Here !/6. Building A Phishing Detection System With AI/9. [AP] How to check the AI system performance - Precision and Recall.mp4 73.12 MB
  25. ~Get Your Files Here !/7. AI In Network Security/5. [AP] Preparing network anomaly dataset - part 2.mp4 71.47 MB
  26. ~Get Your Files Here !/6. Building A Phishing Detection System With AI/3. [AT] How To Recognize And Prevent Phishing Attacks.mp4 69.60 MB
  27. ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/9. [AP] Advanced ChatGPT Techniques.mp4 69.19 MB
  28. ~Get Your Files Here !/9. AI Security Risks/5. [AT] What are Ethical Concerns that all of us have.mp4 69.08 MB
  29. ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/11. [AP] Exercise Solution.mp4 68.39 MB
  30. ~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/4. [AT] How to use AI for Email Filtering.mp4 67.70 MB
  31. ~Get Your Files Here !/6. Building A Phishing Detection System With AI/7. [AP] Intuition lecture Decision Trees algorithm.mp4 64.06 MB
  32. ~Get Your Files Here !/9. AI Security Risks/3. [AT] What is Data Bias.mp4 62.84 MB
  33. ~Get Your Files Here !/5. Building An Email Filtering System With AI/8. [AP] How to clean and prepare text data for AIML.mp4 59.50 MB
  34. ~Get Your Files Here !/7. AI In Network Security/6. [AP] Intuition lecture Logistic Regression algorithm.mp4 58.62 MB
  35. ~Get Your Files Here !/5. Building An Email Filtering System With AI/5. [AP] How to load data and work with different data source files.mp4 58.12 MB
  36. ~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/5. Understanding Cyber Security Certifications.mp4 57.60 MB
  37. ~Get Your Files Here !/7. AI In Network Security/4. [AP] Preparing network anomaly dataset - part 1.mp4 57.28 MB
  38. ~Get Your Files Here !/6. Building A Phishing Detection System With AI/4. [AP] Loading and understanding Phishing dataset.mp4 55.82 MB
  39. ~Get Your Files Here !/3. New Age Of Social Engineering/3. [APT] Voice Cloning With ElevenLabs.mp4 51.97 MB
  40. ~Get Your Files Here !/5. Building An Email Filtering System With AI/7. [AP] How to analyze and work with text data.mp4 51.21 MB
  41. ~Get Your Files Here !/1. Introduction To The Course/1. How To Follow This Course .mp4 50.33 MB
  42. ~Get Your Files Here !/6. Building A Phishing Detection System With AI/5. [AP] Analyzing Phishing data.mp4 49.89 MB
  43. ~Get Your Files Here !/8. AI For Malware Detection/5. [AP] Preparing Malware Dataset for MLAI.mp4 48.34 MB
  44. ~Get Your Files Here !/6. Building A Phishing Detection System With AI/2. [AT] What is Phishing in the cyber-world.mp4 47.94 MB
  45. ~Get Your Files Here !/5. Building An Email Filtering System With AI/11. [AP] Training KNN algorithm to detect spam emails.mp4 45.50 MB
  46. ~Get Your Files Here !/3. New Age Of Social Engineering/5. [APT] Creating Deepfakes With D-ID.mp4 41.17 MB
  47. ~Get Your Files Here !/7. AI In Network Security/8. [AP] How to improve an MLAI algorithm - Hyperparameter Optimization.mp4 39.51 MB
  48. ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/4. [AP] Using Chain Of Thought Prompting to get more detailed and quality response.mp4 36.61 MB
  49. ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/2. [AP] What is Prompt Engineering in Generative AI.mp4 31.64 MB
  50. ~Get Your Files Here !/2. ChatGPT For Cyber SecurityEthical Hacking/3. [AP] How to use Few Shot Prompting to achieve better ChatGPT responses.mp4 30.63 MB