-
Урок 1.
00:05:46
1. Overview of Advanced Post Exploitation with AI and ChatGPT
-
Урок 2.
00:06:23
2. Ethical Hacking with AI - Lab Architecture
-
Урок 3.
00:08:06
3. Comprehending Post Exploitation Activities and Actions
-
Урок 4.
00:05:25
4. Utilizing Advanced AI Techniques in Post Exploitation
-
Урок 5.
00:04:24
5. Understanding Privilege Escalation
-
Урок 6.
00:06:34
6. Exploring Reinforcement Learning for Privilege Escalation
-
Урок 7.
00:12:51
7. Lab - Applying Advanced AI Technique for Privilege Escalation
-
Урок 8.
00:06:35
8. Risk Assessment &Implementing Countermeasures for AI use in Privilege Escalation
-
Урок 9.
00:05:11
9. Grasping the Concept of Lateral Movement
-
Урок 10.
00:06:41
10. Understanding GML for Lateral Movement
-
Урок 11.
00:13:37
11. Lab- Implementing GML for Lateral Movement
-
Урок 12.
00:05:58
12. Risk Assessment &Implementing Countermeasures for the AI use in Lateral Movement
-
Урок 13.
00:06:31
13. Comprehending Data Exfiltration Techniques
-
Урок 14.
00:07:46
14. Exploring Generative AI for Data Exfiltration
-
Урок 15.
00:07:26
15. Advanced AI Technique for Data Exfiltration
-
Урок 16.
00:11:41
16. Lab- Implementing Generative AI for Data Exfiltration
-
Урок 17.
00:04:20
17. Risk Assessment &Implementing Countermeasure for the AI use in Data Exfiltration
-
Урок 18.
00:05:07
18. Understanding Generative AI for Persistence
-
Урок 19.
00:13:05
19. Lab- Implementing Generative AI for Persistence
-
Урок 20.
00:03:08
20. Risk Assessment and Implementing Countermeasures for the AI use in Persistence
-
Урок 21.
00:07:21
21. Understanding Evasion Techniques
-
Урок 22.
00:18:26
22. Lab- Implementing Evasion with Advanced AI Technique
-
Урок 23.
00:14:05
23. Lab- Exploring Evasion with FGSM
-
Урок 24.
00:08:20
24. Evasion Techniques in Malware Detection
-
Урок 25.
00:18:39
25. Lab- Malware Detection and Evasion with AI
-
Урок 26.
00:05:43
26. Risks and Countermeasures for the use of Advanced AI in Evasion Techniques
-
Урок 27.
00:05:18
27. Understanding AI-Driven Exploitation Techniques
-
Урок 28.
00:05:01
28. Exploring AI-Assisted Fuzzing
-
Урок 29.
00:18:51
29. Lab- Implementing AI-Assisted Fuzzing
-
Урок 30.
00:08:09
30. Harnessing AI for Effective Reverse Engineering
-
Урок 31.
00:05:20
31. Applying AI Techniques in Reverse Engineering
-
Урок 32.
00:04:39
32. Automating Payload Delivery Through AI
-
Урок 33.
00:03:44
33. Automated Analysis Using ChatGPT- Empowering Ethical Hacking with AI
-
Урок 34.
00:09:41
34. Lab- Automated Binary Analysis and Vulnerability Detection with ChatGPT
-
Урок 35.
00:04:16
35. Understanding Advanced Exploit Development and Personalization with AI
-
Урок 36.
00:04:33
36. The Role of AI in Exploit Development and Personalization
-
Урок 37.
00:10:22
37. Lab- Simple Technique for SQL Injection Exploit Generation
-
Урок 38.
00:04:52
38. Understanding Markov Chain Model
-
Урок 39.
00:12:30
39. Lab- Automated SQL Injection Exploit Generation with AI
-
Урок 40.
00:19:03
40. Lab- Automated SQL Injection Exploit Generation with ChatGPT
-
Урок 41.
00:06:47
41. Exploit Development and Personalization-Power of Tailored Attacks
-
Урок 42.
00:04:59
42. Exploit Development and Personalization Scenario & Examples
-
Урок 43.
00:08:10
43. Lab- Simple Personalized Random Exploit Generator
-
Урок 44.
00:05:36
44. Personalized Exploit Generator- ChatGPT Over Simple Random
-
Урок 45.
00:11:45
45. Lab- Exploit Development and Personalization using ChatGPT
-
Урок 46.
00:05:22
46. The Use of AI in Reporting and Remediation
-
Урок 47.
00:04:36
47. AI-driven Vulnerability Reporting and AI-Powered Remediation Guidance
-
Урок 48.
00:11:57
48. Lab- AI-driven Vulnerability Reporting and Remediation Guidance with ChatGPT
-
Урок 49.
00:04:30
49. AI-driven Vulnerability Reporting and Automated Security Analysis
-
Урок 50.
00:26:45
50. Explainable AI (XAI) for Advanced Ethical Hacking_1
-
Урок 51.
00:04:56
51. Exploring the Future of AI and ChatGPT in Ethical Hacking
-
Урок 52.
00:04:28
52. Understanding the Limitations, Pitfalls, and Future of AI in Ethical Hacking
-
Урок 53.
00:04:03
53. Discussing the Potential of AI Replacing Humans in Ethical Hacking in the Future