| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/005. 4.4 Exploring Examples of LangGraph in Action.mp4 |
86.6 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/01 Introduction/001. Introduction.mp4 |
20.5 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/001. Learning objectives.en.srt |
4 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/001. Learning objectives.mp4 |
18.8 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/002. 1.1 Overview of the Evolution of AI-driven Tools.en.srt |
6 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/002. 1.1 Overview of the Evolution of AI-driven Tools.mp4 |
17.6 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).en.srt |
12 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).mp4 |
30 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.en.srt |
8 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.mp4 |
27.2 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/005. 1.4 An Overview of Open-source AI Models and Hugging Face.en.srt |
4 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/005. 1.4 An Overview of Open-source AI Models and Hugging Face.mp4 |
17 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/006. 1.5 Introducing Retrieval Augmented Generation (RAG).en.srt |
16 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/006. 1.5 Introducing Retrieval Augmented Generation (RAG).mp4 |
37.7 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/007. 1.6 Introducing Embedding Models.en.srt |
8 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/007. 1.6 Introducing Embedding Models.mp4 |
39.5 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.en.srt |
5 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.mp4 |
17.7 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/009. 1.8 Introducing Semantic Search.en.srt |
6 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/02 Lesson 1 - Introduction to AI-powered Tools/009. 1.8 Introducing Semantic Search.mp4 |
24.5 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/03 Lesson 2 - Using AI for Cybersecurity/001. Learning objectives.en.srt |
2 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/03 Lesson 2 - Using AI for Cybersecurity/001. Learning objectives.mp4 |
9.6 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/03 Lesson 2 - Using AI for Cybersecurity/002. 2.1 Accelerating Network Security Tasks with AI.en.srt |
7 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/03 Lesson 2 - Using AI for Cybersecurity/002. 2.1 Accelerating Network Security Tasks with AI.mp4 |
16.1 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/03 Lesson 2 - Using AI for Cybersecurity/003. 2.2 Prompt Engineering for Cybersecurity.en.srt |
4 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/03 Lesson 2 - Using AI for Cybersecurity/003. 2.2 Prompt Engineering for Cybersecurity.mp4 |
11.3 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/03 Lesson 2 - Using AI for Cybersecurity/004. 2.3 Securing AI Implementations.en.srt |
21 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/03 Lesson 2 - Using AI for Cybersecurity/004. 2.3 Securing AI Implementations.mp4 |
63.1 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/03 Lesson 2 - Using AI for Cybersecurity/005. 2.4 Exploring Network Security Processes Incorporating AI Tools.en.srt |
12 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/03 Lesson 2 - Using AI for Cybersecurity/005. 2.4 Exploring Network Security Processes Incorporating AI Tools.mp4 |
31.9 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/001. Learning objectives.en.srt |
3 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/001. Learning objectives.mp4 |
14.4 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/002. 3.1 Exploring How AI is Revolutionizing Software Development.en.srt |
3 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/002. 3.1 Exploring How AI is Revolutionizing Software Development.mp4 |
11.7 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/003. 3.2 Surveying GitHub Copilot, Cursor, and Cody.en.srt |
3 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/003. 3.2 Surveying GitHub Copilot, Cursor, and Cody.mp4 |
7.6 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/004. 3.3 Exploring the CODEX Model.en.srt |
2 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/004. 3.3 Exploring the CODEX Model.mp4 |
3.6 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/005. 3.4 Generating Code from a Prompt.en.srt |
8 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/005. 3.4 Generating Code from a Prompt.mp4 |
21 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/006. 3.5 Explaining Existing Code.en.srt |
4 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/006. 3.5 Explaining Existing Code.mp4 |
13 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/007. 3.6 Generating Comments.en.srt |
6 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/007. 3.6 Generating Comments.mp4 |
14.5 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/008. 3.7 Prompt Engineering for Software Development.en.srt |
12 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/04 Lesson 3 - Using AI for Software Development/008. 3.7 Prompt Engineering for Software Development.mp4 |
29.6 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/05 Lesson 4 - Using AI for Networking/001. Learning objectives.en.srt |
1 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/05 Lesson 4 - Using AI for Networking/001. Learning objectives.mp4 |
6.7 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/05 Lesson 4 - Using AI for Networking/002. 4.1 Exploring how AI is Revolutionizing Networking.en.srt |
12 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/05 Lesson 4 - Using AI for Networking/002. 4.1 Exploring how AI is Revolutionizing Networking.mp4 |
25.7 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/05 Lesson 4 - Using AI for Networking/003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.en.srt |
9 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/05 Lesson 4 - Using AI for Networking/003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.mp4 |
22.7 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/05 Lesson 4 - Using AI for Networking/004. 4.3 Exploring AI Models for Networking Use Cases.en.srt |
3 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/05 Lesson 4 - Using AI for Networking/004. 4.3 Exploring AI Models for Networking Use Cases.mp4 |
7.5 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/05 Lesson 4 - Using AI for Networking/005. 4.4 Prompt Engineering for Networking.en.srt |
9 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/05 Lesson 4 - Using AI for Networking/005. 4.4 Prompt Engineering for Networking.mp4 |
22.6 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/06 Lesson 5 - Future Trends and Additional Emerging Technologies/001. Learning objectives.en.srt |
1 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/06 Lesson 5 - Future Trends and Additional Emerging Technologies/001. Learning objectives.mp4 |
7 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/06 Lesson 5 - Future Trends and Additional Emerging Technologies/002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.en.srt |
8 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/06 Lesson 5 - Future Trends and Additional Emerging Technologies/002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.mp4 |
16.2 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/06 Lesson 5 - Future Trends and Additional Emerging Technologies/003. 5.2 Regulatory and Policy Frameworks.en.srt |
8 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/06 Lesson 5 - Future Trends and Additional Emerging Technologies/003. 5.2 Regulatory and Policy Frameworks.mp4 |
21.9 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/06 Lesson 5 - Future Trends and Additional Emerging Technologies/004. 5.3 Staying Updated on Advancements in AI and Cybersecurity.en.srt |
5 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/06 Lesson 5 - Future Trends and Additional Emerging Technologies/004. 5.3 Staying Updated on Advancements in AI and Cybersecurity.mp4 |
13.9 MB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/07 Summary/001. Summary.en.srt |
4 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/07 Summary/001. Summary.mp4 |
17.3 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/01 Introduction/001. Introduction.en.srt |
4 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/01 Introduction/001. Introduction.mp4 |
18.8 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/001. Learning objectives.en.srt |
2 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/001. Learning objectives.mp4 |
8.6 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.en.srt |
10 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 |
48.8 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/003. 1.2 Exploring the Resources for this Course - GitHub Repositories and Others.en.srt |
5 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/003. 1.2 Exploring the Resources for this Course - GitHub Repositories and Others.mp4 |
11 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).en.srt |
18 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 |
34 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.en.srt |
9 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 |
20.9 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.en.srt |
8 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 |
26.4 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/007. 1.6 Understanding the NIST Taxonomy and Terminology of Attacks and Mitigations.en.srt |
11 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/02 Lesson 1 - Introduction to AI Threats and LLM Security/007. 1.6 Understanding the NIST Taxonomy and Terminology of Attacks and Mitigations.mp4 |
21.6 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/001. Learning objectives.en.srt |
1 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/001. Learning objectives.mp4 |
6.6 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.en.srt |
17 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4 |
66.1 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.en.srt |
6 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 |
17.2 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.en.srt |
15 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 |
38.2 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/005. 2.4 Enforcing Privilege Control on LLM Access to Backend Systems.en.srt |
8 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/005. 2.4 Enforcing Privilege Control on LLM Access to Backend Systems.mp4 |
15.9 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/006. 2.5 Best Practices Around API Tokens for Plugins, Data Access, and Function-level Permissions.en.srt |
4 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/006. 2.5 Best Practices Around API Tokens for Plugins, Data Access, and Function-level Permissions.mp4 |
10.2 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/007. 2.6 Understanding Insecure Output Handling Attacks.en.srt |
5 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/007. 2.6 Understanding Insecure Output Handling Attacks.mp4 |
8.4 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.en.srt |
7 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/03 Lesson 2 - Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 |
20 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/04 Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/001. Learning objectives.en.srt |
951 B |
| Defending and Deploying AI (2025)/02 Securing Generative AI/04 Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/001. Learning objectives.mp4 |
4.9 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/04 Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.en.srt |
7 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/04 Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4 |
21.8 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/04 Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/003. 3.2 Exploring Model Denial of Service Attacks.en.srt |
4 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/04 Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/003. 3.2 Exploring Model Denial of Service Attacks.mp4 |
9.9 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/04 Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.en.srt |
14 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/04 Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 |
36.3 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/04 Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.en.srt |
19 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/04 Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 |
52.4 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/04 Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environm.mp4 |
67.9 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/04 Lesson 3 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environm.srt |
23 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/05 Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/001. Learning objectives.en.srt |
1 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/05 Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/001. Learning objectives.mp4 |
6.5 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/05 Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.en.srt |
4 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/05 Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4 |
18.1 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/05 Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/003. 4.2 Exploiting Insecure Plugin Design.en.srt |
4 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/05 Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/003. 4.2 Exploiting Insecure Plugin Design.mp4 |
12.1 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/05 Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/004. 4.3 Avoiding Excessive Agency.en.srt |
5 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/05 Lesson 4 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/004. 4.3 Avoiding Excessive Agency.mp4 |
14.9 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/06 Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/001. Learning objectives.en.srt |
885 B |
| Defending and Deploying AI (2025)/02 Securing Generative AI/06 Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/001. Learning objectives.mp4 |
4.5 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/06 Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.en.srt |
7 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/06 Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4 |
21.2 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/06 Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/003. 5.2 Exploring Model Theft Attacks.en.srt |
7 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/06 Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/003. 5.2 Exploring Model Theft Attacks.mp4 |
16.5 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/06 Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.en.srt |
19 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/06 Lesson 5 - Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4 |
49.1 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/07 Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/001. Learning objectives.en.srt |
1 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/07 Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/001. Learning objectives.mp4 |
6.8 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/07 Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.en.srt |
25 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/07 Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 |
60.2 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/07 Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.en.srt |
14 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/07 Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4 |
29.3 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/07 Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.en.srt |
18 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/07 Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4 |
41.7 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/07 Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.en.srt |
11 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/07 Lesson 6 - Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4 |
23.4 MB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/08 Summary/001. Summary.en.srt |
2 KB |
| Defending and Deploying AI (2025)/02 Securing Generative AI/08 Summary/001. Summary.mp4 |
10.6 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/01 Introduction/001. Introduction.en.srt |
2 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/01 Introduction/001. Introduction.mp4 |
12.3 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/001. Learning objectives.en.srt |
2 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/001. Learning objectives.mp4 |
9.4 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/002. 1.1 Overview of AI Labs and Sandboxes - Home-based vs. Cloud-based.en.srt |
9 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/002. 1.1 Overview of AI Labs and Sandboxes - Home-based vs. Cloud-based.mp4 |
20.1 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/003. 1.2 Choosing the Right Hardware (GPUs, CPUs, Memory, etc.).en.srt |
11 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/003. 1.2 Choosing the Right Hardware (GPUs, CPUs, Memory, etc.).mp4 |
50.3 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/004. 1.3 Building or Buying Pre-built Systems.en.srt |
5 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/004. 1.3 Building or Buying Pre-built Systems.mp4 |
15.2 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/005. 1.4 Choosing the Operating Systems (Linux, Windows, macOS).en.srt |
5 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/005. 1.4 Choosing the Operating Systems (Linux, Windows, macOS).mp4 |
16.6 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/006. 1.5 Surveying Essential Software (Python, Anaconda, Jupyter Notebooks, and Other Frameworks).en.srt |
6 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/006. 1.5 Surveying Essential Software (Python, Anaconda, Jupyter Notebooks, and Other Frameworks).mp4 |
18.8 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/007. 1.6 Introducing Hugging Face.en.srt |
4 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/007. 1.6 Introducing Hugging Face.mp4 |
13.8 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/008. 1.7 Introducing Ollama.en.srt |
4 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/008. 1.7 Introducing Ollama.mp4 |
12.3 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/009. 1.8 Installing Ollama.en.srt |
7 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/009. 1.8 Installing Ollama.mp4 |
16.6 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/010. 1.9 Ollama Integrations.en.srt |
18 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/010. 1.9 Ollama Integrations.mp4 |
47 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/011. 1.10 Exploring the Ollama REST API.en.srt |
3 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/011. 1.10 Exploring the Ollama REST API.mp4 |
12.7 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/012. 1.11 Introducing Retrieval Augmented Generation (RAG).en.srt |
6 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/012. 1.11 Introducing Retrieval Augmented Generation (RAG).mp4 |
13.9 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/013. 1.12 Leveraging RAGFlow.en.srt |
17 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/02 Lesson 1 - Introduction to AI Labs and Sandboxes/013. 1.12 Leveraging RAGFlow.mp4 |
40.7 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/001. Learning objectives.en.srt |
542 B |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/001. Learning objectives.mp4 |
3.8 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/002. 2.1 Advantages and Disadvantages of Cloud AI Labs and Sandboxes.en.srt |
10 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/002. 2.1 Advantages and Disadvantages of Cloud AI Labs and Sandboxes.mp4 |
19.1 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/003. 2.2 Introducing Amazon Bedrock.en.srt |
9 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/003. 2.2 Introducing Amazon Bedrock.mp4 |
21 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/004. 2.3 Surveying Amazon SageMaker.en.srt |
15 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/004. 2.3 Surveying Amazon SageMaker.mp4 |
36.3 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/005. 2.4 Exploring Google Vertex AI.en.srt |
17 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/005. 2.4 Exploring Google Vertex AI.mp4 |
43.4 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/006. 2.5 Using Microsoft Azure AI Foundry.en.srt |
12 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/006. 2.5 Using Microsoft Azure AI Foundry.mp4 |
36.3 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/007. 2.6 Discussing Cost Management and Security.en.srt |
8 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/007. 2.6 Discussing Cost Management and Security.mp4 |
21.5 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/008. 2.7 Using Terraform to Deploy Ollama in the Cloud.en.srt |
4 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/03 Lesson 2 - Cloud-Based AI Labs and Sandboxes/008. 2.7 Using Terraform to Deploy Ollama in the Cloud.mp4 |
10.4 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/001. Learning objectives.en.srt |
718 B |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/001. Learning objectives.mp4 |
4.5 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/002. 3.1 Using Hybrid AI Labs - Combining Home and Cloud Resources.en.srt |
2 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/002. 3.1 Using Hybrid AI Labs - Combining Home and Cloud Resources.mp4 |
5.9 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/003. 3.2 Synchronizing Data and Projects.en.srt |
5 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/003. 3.2 Synchronizing Data and Projects.mp4 |
11.2 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/004. 3.3 Leveraging the Strengths of Both Environments.en.srt |
7 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/004. 3.3 Leveraging the Strengths of Both Environments.mp4 |
19.5 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/005. 3.4 Running Open-Source Models Available on Hugging Face.en.srt |
5 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/005. 3.4 Running Open-Source Models Available on Hugging Face.mp4 |
14.2 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/006. 3.5 Introducing LangChain.en.srt |
4 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/006. 3.5 Introducing LangChain.mp4 |
9.2 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/007. 3.6 Introducing LlamaIndex.en.srt |
3 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/007. 3.6 Introducing LlamaIndex.mp4 |
7.5 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/008. 3.7 Understanding Embedding Models.en.srt |
8 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/008. 3.7 Understanding Embedding Models.mp4 |
32 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/009. 3.8 Using Vector Databases.en.srt |
6 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/04 Lesson 3 - Integrating and Leveraging AI Environments/009. 3.8 Using Vector Databases.mp4 |
17.4 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/05 Lesson 4 - Advanced Topics/001. Learning objectives.en.srt |
612 B |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/05 Lesson 4 - Advanced Topics/001. Learning objectives.mp4 |
3.7 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/05 Lesson 4 - Advanced Topics/002. 4.1 Leveraging LangSmith and LangGraph.en.srt |
6 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/05 Lesson 4 - Advanced Topics/002. 4.1 Leveraging LangSmith and LangGraph.mp4 |
14.7 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/05 Lesson 4 - Advanced Topics/003. 4.2 Using Fine Tuning Frameworks.en.srt |
6 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/05 Lesson 4 - Advanced Topics/003. 4.2 Using Fine Tuning Frameworks.mp4 |
17.1 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/05 Lesson 4 - Advanced Topics/004. 4.3 High-Performance Computing and Edge AI.en.srt |
5 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/05 Lesson 4 - Advanced Topics/004. 4.3 High-Performance Computing and Edge AI.mp4 |
11.8 MB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/06 Summary/001. Summary.en.srt |
1 KB |
| Defending and Deploying AI (2025)/03 Build Your Own AI Lab/06 Summary/001. Summary.mp4 |
7.2 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/01 Introduction/001. Introduction.en.srt |
3 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/01 Introduction/001. Introduction.mp4 |
15.7 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/001. Learning objectives.en.srt |
1 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/001. Learning objectives.mp4 |
9.1 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/002. 1.1 Introduction to Retrieval Augmented Generation (RAG).en.srt |
9 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/002. 1.1 Introduction to Retrieval Augmented Generation (RAG).mp4 |
23 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/003. 1.2 Exploring the GitHub Repositories and Additional Resources.en.srt |
4 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/003. 1.2 Exploring the GitHub Repositories and Additional Resources.mp4 |
12.6 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/004. 1.3 Embeddings and Embedding Models.en.srt |
21 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/004. 1.3 Embeddings and Embedding Models.mp4 |
81.4 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/005. 1.4 Indexing Techniques.en.srt |
15 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/005. 1.4 Indexing Techniques.mp4 |
34.3 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/006. 1.5 Vector Databases.en.srt |
7 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/006. 1.5 Vector Databases.mp4 |
19.4 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/007. 1.6 Chunking Strategies.en.srt |
11 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/007. 1.6 Chunking Strategies.mp4 |
35.5 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/008. 1.7 RAG vs. Fine-tuning.en.srt |
16 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/008. 1.7 RAG vs. Fine-tuning.mp4 |
48.9 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/009. 1.8 RAG, RAG Fusion, and RAPTOR.en.srt |
13 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/009. 1.8 RAG, RAG Fusion, and RAPTOR.mp4 |
29.1 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/010. 1.9 Running Open Weight Models with Ollama.en.srt |
19 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/010. 1.9 Running Open Weight Models with Ollama.mp4 |
62.8 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/011. 1.10 Exploring Open WebUI and Other Ollama Plugins.en.srt |
14 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/011. 1.10 Exploring Open WebUI and Other Ollama Plugins.mp4 |
49.8 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/012. 1.11 Introduction to AI Agents and Agentic Implementations.en.srt |
7 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/012. 1.11 Introduction to AI Agents and Agentic Implementations.mp4 |
18.4 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/013. 1.12 Introduction to Agentic RAG.en.srt |
7 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/013. 1.12 Introduction to Agentic RAG.mp4 |
17.9 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/014. 1.13 Introducing the Model Context Protocol (MCP).en.srt |
16 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/014. 1.13 Introducing the Model Context Protocol (MCP).mp4 |
49 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/015. 1.14 Introducing A2A and AGNTCY.en.srt |
23 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/02 Lesson 1 - Introduction to RAG in Cybersecurity/015. 1.14 Introducing A2A and AGNTCY.mp4 |
67 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/03 Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/001. Learning objectives.en.srt |
1 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/03 Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/001. Learning objectives.mp4 |
6.7 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/03 Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/002. 2.1 Introducing LangChain.en.srt |
6 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/03 Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/002. 2.1 Introducing LangChain.mp4 |
18.1 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/03 Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/003. 2.2 LangChain vs. LlamaIndex.en.srt |
5 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/03 Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/003. 2.2 LangChain vs. LlamaIndex.mp4 |
21 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/03 Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/004. 2.3 Prompt templates and system prompts.en.srt |
18 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/03 Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/004. 2.3 Prompt templates and system prompts.mp4 |
74.2 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/03 Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/005. 2.4 Introducing LangSmith.en.srt |
8 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/03 Lesson 2 - Introducing LangChain, LangGraph, and LLamaIndex/005. 2.4 Introducing LangSmith.mp4 |
24.7 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/001. Learning objectives.en.srt |
1 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/001. Learning objectives.mp4 |
6.7 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/002. 3.1 Mastering Prompt Engineering.en.srt |
5 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/002. 3.1 Mastering Prompt Engineering.mp4 |
16.1 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/003. 3.2 Exploring Basic Prompt Chain Examples.en.srt |
12 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/003. 3.2 Exploring Basic Prompt Chain Examples.mp4 |
47.2 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/004. 3.3 Creating Prompt Branching Chains.en.srt |
15 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/004. 3.3 Creating Prompt Branching Chains.mp4 |
56.8 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/005. 3.4 Exploring Parallel PromptChains.en.srt |
9 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/005. 3.4 Exploring Parallel PromptChains.mp4 |
42.2 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/006. 3.5 Creating a Basic RAG Application.en.srt |
18 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/006. 3.5 Creating a Basic RAG Application.mp4 |
69.8 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/007. 3.6 Creating a Complete RAG Application.en.srt |
5 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/04 Lesson 3 - Prompt Engineering, Prompt Chains, and RAG Examples/007. 3.6 Creating a Complete RAG Application.mp4 |
17.7 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/001. Learning objectives.en.srt |
1 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/001. Learning objectives.mp4 |
6.2 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/002. 4.1 Introduction to AI Agent Frameworks.en.srt |
7 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/002. 4.1 Introduction to AI Agent Frameworks.mp4 |
19.1 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/003. 4.2 Surveying CrewAI.en.srt |
10 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/003. 4.2 Surveying CrewAI.mp4 |
24.5 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/004. 4.3 Introducing LangGraph.en.srt |
3 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/004. 4.3 Introducing LangGraph.mp4 |
10.1 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/005. 4.4 Exploring Examples of LangGraph in Action.en.srt |
19 KB |
| Defending and Deploying AI (2025)/01 AI-Enabled Programming, Networking, and Cybersecurity/01 Introduction/001. Introduction.en.srt |
4 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/006. 4.5 Exploring an Example of Agents with MCP Servers.en.srt |
15 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/006. 4.5 Exploring an Example of Agents with MCP Servers.mp4 |
59.3 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/007. 4.6 Securing Agentic Implementations.en.srt |
13 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/05 Lesson 4 - AI Agents and Agentic Frameworks/007. 4.6 Securing Agentic Implementations.mp4 |
37.3 MB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/06 Summary/001. Summary.en.srt |
3 KB |
| Defending and Deploying AI (2025)/04 AI Agents and Agentic RAG for Cybersecurity/06 Summary/001. Summary.mp4 |
16.7 MB |