Урок 1.00:05:46
1. Overview of Advanced Post Exploitation with AI and ChatGPT
Урок 2.00:06:23
2. Ethical Hacking with AI - Lab Architecture
Урок 3.00:08:06
3. Comprehending Post Exploitation Activities and Actions
Урок 4.00:05:25
4. Utilizing Advanced AI Techniques in Post Exploitation
Урок 5.00:04:24
5. Understanding Privilege Escalation
Урок 6.00:06:34
6. Exploring Reinforcement Learning for Privilege Escalation
Урок 7.00:12:51
7. Lab - Applying Advanced AI Technique for Privilege Escalation
Урок 8.00:06:35
8. Risk Assessment &Implementing Countermeasures for AI use in Privilege Escalation
Урок 9.00:05:11
9. Grasping the Concept of Lateral Movement
Урок 10.00:06:41
10. Understanding GML for Lateral Movement
Урок 11.00:13:37
11. Lab- Implementing GML for Lateral Movement
Урок 12.00:05:58
12. Risk Assessment &Implementing Countermeasures for the AI use in Lateral Movement
Урок 13.00:06:31
13. Comprehending Data Exfiltration Techniques
Урок 14.00:07:46
14. Exploring Generative AI for Data Exfiltration
Урок 15.00:07:26
15. Advanced AI Technique for Data Exfiltration
Урок 16.00:11:41
16. Lab- Implementing Generative AI for Data Exfiltration
Урок 17.00:04:20
17. Risk Assessment &Implementing Countermeasure for the AI use in Data Exfiltration
Урок 18.00:05:07
18. Understanding Generative AI for Persistence
Урок 19.00:13:05
19. Lab- Implementing Generative AI for Persistence
Урок 20.00:03:08
20. Risk Assessment and Implementing Countermeasures for the AI use in Persistence
Урок 21.00:07:21
21. Understanding Evasion Techniques
Урок 22.00:18:26
22. Lab- Implementing Evasion with Advanced AI Technique
Урок 23.00:14:05
23. Lab- Exploring Evasion with FGSM
Урок 24.00:08:20
24. Evasion Techniques in Malware Detection
Урок 25.00:18:39
25. Lab- Malware Detection and Evasion with AI
Урок 26.00:05:43
26. Risks and Countermeasures for the use of Advanced AI in Evasion Techniques
Урок 27.00:05:18
27. Understanding AI-Driven Exploitation Techniques
Урок 28.00:05:01
28. Exploring AI-Assisted Fuzzing
Урок 29.00:18:51
29. Lab- Implementing AI-Assisted Fuzzing
Урок 30.00:08:09
30. Harnessing AI for Effective Reverse Engineering
Урок 31.00:05:20
31. Applying AI Techniques in Reverse Engineering
Урок 32.00:04:39
32. Automating Payload Delivery Through AI
Урок 33.00:03:44
33. Automated Analysis Using ChatGPT- Empowering Ethical Hacking with AI
Урок 34.00:09:41
34. Lab- Automated Binary Analysis and Vulnerability Detection with ChatGPT
Урок 35.00:04:16
35. Understanding Advanced Exploit Development and Personalization with AI
Урок 36.00:04:33
36. The Role of AI in Exploit Development and Personalization
Урок 37.00:10:22
37. Lab- Simple Technique for SQL Injection Exploit Generation
Урок 38.00:04:52
38. Understanding Markov Chain Model
Урок 39.00:12:30
39. Lab- Automated SQL Injection Exploit Generation with AI
Урок 40.00:19:03
40. Lab- Automated SQL Injection Exploit Generation with ChatGPT
Урок 41.00:06:47
41. Exploit Development and Personalization-Power of Tailored Attacks
Урок 42.00:04:59
42. Exploit Development and Personalization Scenario & Examples
Урок 43.00:08:10
43. Lab- Simple Personalized Random Exploit Generator
Урок 44.00:05:36
44. Personalized Exploit Generator- ChatGPT Over Simple Random
Урок 45.00:11:45
45. Lab- Exploit Development and Personalization using ChatGPT
Урок 46.00:05:22
46. The Use of AI in Reporting and Remediation
Урок 47.00:04:36
47. AI-driven Vulnerability Reporting and AI-Powered Remediation Guidance
Урок 48.00:11:57
48. Lab- AI-driven Vulnerability Reporting and Remediation Guidance with ChatGPT
Урок 49.00:04:30
49. AI-driven Vulnerability Reporting and Automated Security Analysis
Урок 50.00:26:45
50. Explainable AI (XAI) for Advanced Ethical Hacking_1
Урок 51.00:04:56
51. Exploring the Future of AI and ChatGPT in Ethical Hacking
Урок 52.00:04:28
52. Understanding the Limitations, Pitfalls, and Future of AI in Ethical Hacking
Урок 53.00:04:03
53. Discussing the Potential of AI Replacing Humans in Ethical Hacking in the Future