1. Урок 1. 00:05:46
    1. Overview of Advanced Post Exploitation with AI and ChatGPT
  2. Урок 2. 00:06:23
    2. Ethical Hacking with AI - Lab Architecture
  3. Урок 3. 00:08:06
    3. Comprehending Post Exploitation Activities and Actions
  4. Урок 4. 00:05:25
    4. Utilizing Advanced AI Techniques in Post Exploitation
  5. Урок 5. 00:04:24
    5. Understanding Privilege Escalation
  6. Урок 6. 00:06:34
    6. Exploring Reinforcement Learning for Privilege Escalation
  7. Урок 7. 00:12:51
    7. Lab - Applying Advanced AI Technique for Privilege Escalation
  8. Урок 8. 00:06:35
    8. Risk Assessment &Implementing Countermeasures for AI use in Privilege Escalation
  9. Урок 9. 00:05:11
    9. Grasping the Concept of Lateral Movement
  10. Урок 10. 00:06:41
    10. Understanding GML for Lateral Movement
  11. Урок 11. 00:13:37
    11. Lab- Implementing GML for Lateral Movement
  12. Урок 12. 00:05:58
    12. Risk Assessment &Implementing Countermeasures for the AI use in Lateral Movement
  13. Урок 13. 00:06:31
    13. Comprehending Data Exfiltration Techniques
  14. Урок 14. 00:07:46
    14. Exploring Generative AI for Data Exfiltration
  15. Урок 15. 00:07:26
    15. Advanced AI Technique for Data Exfiltration
  16. Урок 16. 00:11:41
    16. Lab- Implementing Generative AI for Data Exfiltration
  17. Урок 17. 00:04:20
    17. Risk Assessment &Implementing Countermeasure for the AI use in Data Exfiltration
  18. Урок 18. 00:05:07
    18. Understanding Generative AI for Persistence
  19. Урок 19. 00:13:05
    19. Lab- Implementing Generative AI for Persistence
  20. Урок 20. 00:03:08
    20. Risk Assessment and Implementing Countermeasures for the AI use in Persistence
  21. Урок 21. 00:07:21
    21. Understanding Evasion Techniques
  22. Урок 22. 00:18:26
    22. Lab- Implementing Evasion with Advanced AI Technique
  23. Урок 23. 00:14:05
    23. Lab- Exploring Evasion with FGSM
  24. Урок 24. 00:08:20
    24. Evasion Techniques in Malware Detection
  25. Урок 25. 00:18:39
    25. Lab- Malware Detection and Evasion with AI
  26. Урок 26. 00:05:43
    26. Risks and Countermeasures for the use of Advanced AI in Evasion Techniques
  27. Урок 27. 00:05:18
    27. Understanding AI-Driven Exploitation Techniques
  28. Урок 28. 00:05:01
    28. Exploring AI-Assisted Fuzzing
  29. Урок 29. 00:18:51
    29. Lab- Implementing AI-Assisted Fuzzing
  30. Урок 30. 00:08:09
    30. Harnessing AI for Effective Reverse Engineering
  31. Урок 31. 00:05:20
    31. Applying AI Techniques in Reverse Engineering
  32. Урок 32. 00:04:39
    32. Automating Payload Delivery Through AI
  33. Урок 33. 00:03:44
    33. Automated Analysis Using ChatGPT- Empowering Ethical Hacking with AI
  34. Урок 34. 00:09:41
    34. Lab- Automated Binary Analysis and Vulnerability Detection with ChatGPT
  35. Урок 35. 00:04:16
    35. Understanding Advanced Exploit Development and Personalization with AI
  36. Урок 36. 00:04:33
    36. The Role of AI in Exploit Development and Personalization
  37. Урок 37. 00:10:22
    37. Lab- Simple Technique for SQL Injection Exploit Generation
  38. Урок 38. 00:04:52
    38. Understanding Markov Chain Model
  39. Урок 39. 00:12:30
    39. Lab- Automated SQL Injection Exploit Generation with AI
  40. Урок 40. 00:19:03
    40. Lab- Automated SQL Injection Exploit Generation with ChatGPT
  41. Урок 41. 00:06:47
    41. Exploit Development and Personalization-Power of Tailored Attacks
  42. Урок 42. 00:04:59
    42. Exploit Development and Personalization Scenario & Examples
  43. Урок 43. 00:08:10
    43. Lab- Simple Personalized Random Exploit Generator
  44. Урок 44. 00:05:36
    44. Personalized Exploit Generator- ChatGPT Over Simple Random
  45. Урок 45. 00:11:45
    45. Lab- Exploit Development and Personalization using ChatGPT
  46. Урок 46. 00:05:22
    46. The Use of AI in Reporting and Remediation
  47. Урок 47. 00:04:36
    47. AI-driven Vulnerability Reporting and AI-Powered Remediation Guidance
  48. Урок 48. 00:11:57
    48. Lab- AI-driven Vulnerability Reporting and Remediation Guidance with ChatGPT
  49. Урок 49. 00:04:30
    49. AI-driven Vulnerability Reporting and Automated Security Analysis
  50. Урок 50. 00:26:45
    50. Explainable AI (XAI) for Advanced Ethical Hacking_1
  51. Урок 51. 00:04:56
    51. Exploring the Future of AI and ChatGPT in Ethical Hacking
  52. Урок 52. 00:04:28
    52. Understanding the Limitations, Pitfalls, and Future of AI in Ethical Hacking
  53. Урок 53. 00:04:03
    53. Discussing the Potential of AI Replacing Humans in Ethical Hacking in the Future