1. Урок 1.00:05:46
    1. Overview of Advanced Post Exploitation with AI and ChatGPT
  2. Урок 2.00:06:23
    2. Ethical Hacking with AI - Lab Architecture
  3. Урок 3.00:08:06
    3. Comprehending Post Exploitation Activities and Actions
  4. Урок 4.00:05:25
    4. Utilizing Advanced AI Techniques in Post Exploitation
  5. Урок 5.00:04:24
    5. Understanding Privilege Escalation
  6. Урок 6.00:06:34
    6. Exploring Reinforcement Learning for Privilege Escalation
  7. Урок 7.00:12:51
    7. Lab - Applying Advanced AI Technique for Privilege Escalation
  8. Урок 8.00:06:35
    8. Risk Assessment &Implementing Countermeasures for AI use in Privilege Escalation
  9. Урок 9.00:05:11
    9. Grasping the Concept of Lateral Movement
  10. Урок 10.00:06:41
    10. Understanding GML for Lateral Movement
  11. Урок 11.00:13:37
    11. Lab- Implementing GML for Lateral Movement
  12. Урок 12.00:05:58
    12. Risk Assessment &Implementing Countermeasures for the AI use in Lateral Movement
  13. Урок 13.00:06:31
    13. Comprehending Data Exfiltration Techniques
  14. Урок 14.00:07:46
    14. Exploring Generative AI for Data Exfiltration
  15. Урок 15.00:07:26
    15. Advanced AI Technique for Data Exfiltration
  16. Урок 16.00:11:41
    16. Lab- Implementing Generative AI for Data Exfiltration
  17. Урок 17.00:04:20
    17. Risk Assessment &Implementing Countermeasure for the AI use in Data Exfiltration
  18. Урок 18.00:05:07
    18. Understanding Generative AI for Persistence
  19. Урок 19.00:13:05
    19. Lab- Implementing Generative AI for Persistence
  20. Урок 20.00:03:08
    20. Risk Assessment and Implementing Countermeasures for the AI use in Persistence
  21. Урок 21.00:07:21
    21. Understanding Evasion Techniques
  22. Урок 22.00:18:26
    22. Lab- Implementing Evasion with Advanced AI Technique
  23. Урок 23.00:14:05
    23. Lab- Exploring Evasion with FGSM
  24. Урок 24.00:08:20
    24. Evasion Techniques in Malware Detection
  25. Урок 25.00:18:39
    25. Lab- Malware Detection and Evasion with AI
  26. Урок 26.00:05:43
    26. Risks and Countermeasures for the use of Advanced AI in Evasion Techniques
  27. Урок 27.00:05:18
    27. Understanding AI-Driven Exploitation Techniques
  28. Урок 28.00:05:01
    28. Exploring AI-Assisted Fuzzing
  29. Урок 29.00:18:51
    29. Lab- Implementing AI-Assisted Fuzzing
  30. Урок 30.00:08:09
    30. Harnessing AI for Effective Reverse Engineering
  31. Урок 31.00:05:20
    31. Applying AI Techniques in Reverse Engineering
  32. Урок 32.00:04:39
    32. Automating Payload Delivery Through AI
  33. Урок 33.00:03:44
    33. Automated Analysis Using ChatGPT- Empowering Ethical Hacking with AI
  34. Урок 34.00:09:41
    34. Lab- Automated Binary Analysis and Vulnerability Detection with ChatGPT
  35. Урок 35.00:04:16
    35. Understanding Advanced Exploit Development and Personalization with AI
  36. Урок 36.00:04:33
    36. The Role of AI in Exploit Development and Personalization
  37. Урок 37.00:10:22
    37. Lab- Simple Technique for SQL Injection Exploit Generation
  38. Урок 38.00:04:52
    38. Understanding Markov Chain Model
  39. Урок 39.00:12:30
    39. Lab- Automated SQL Injection Exploit Generation with AI
  40. Урок 40.00:19:03
    40. Lab- Automated SQL Injection Exploit Generation with ChatGPT
  41. Урок 41.00:06:47
    41. Exploit Development and Personalization-Power of Tailored Attacks
  42. Урок 42.00:04:59
    42. Exploit Development and Personalization Scenario & Examples
  43. Урок 43.00:08:10
    43. Lab- Simple Personalized Random Exploit Generator
  44. Урок 44.00:05:36
    44. Personalized Exploit Generator- ChatGPT Over Simple Random
  45. Урок 45.00:11:45
    45. Lab- Exploit Development and Personalization using ChatGPT
  46. Урок 46.00:05:22
    46. The Use of AI in Reporting and Remediation
  47. Урок 47.00:04:36
    47. AI-driven Vulnerability Reporting and AI-Powered Remediation Guidance
  48. Урок 48.00:11:57
    48. Lab- AI-driven Vulnerability Reporting and Remediation Guidance with ChatGPT
  49. Урок 49.00:04:30
    49. AI-driven Vulnerability Reporting and Automated Security Analysis
  50. Урок 50.00:26:45
    50. Explainable AI (XAI) for Advanced Ethical Hacking_1
  51. Урок 51.00:04:56
    51. Exploring the Future of AI and ChatGPT in Ethical Hacking
  52. Урок 52.00:04:28
    52. Understanding the Limitations, Pitfalls, and Future of AI in Ethical Hacking
  53. Урок 53.00:04:03
    53. Discussing the Potential of AI Replacing Humans in Ethical Hacking in the Future