Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Mastering AI for Cybersecurity
Announcements
Instructor Message - 4/28/2024 (2:12)
Course Information
Course Schedule
Book Access
ChatGPT for Cybersecurity Cookbook
Live Session Access
Next Live Session Details
Live Session Recordings
Auto AI Agents for Cybersecurity (Open Interpreter, AutoGPT, ChatGPT "Code Interpreter" + Plugins)
Using ChatGPT and the OpenAI API for Cybersecurity Training, Awareness, and Studying (53:35)
Using ChatGPT's New Custom GPT Builder (68:31)
Sam Altman News and Using Custom Actions/APIs in GPT Builder (55:33)
How to use open-source models, locally and privately! (Hint: It's really easy!) (51:47)
How to Setup and Use PrivateGPT for Local (and Private) Document Chat (66:11)
How to user Aider to automatically evaluate for, and automatically fix, vulnerable code. (59:46)
Using Aider to Create a Local Threat Hunting Tool
Using the GPT Vision API to Analyze Network Drawings (50:46)
GRC with PrivateGPT - Cybersecurity Policy (80:33)
GRC with PrivateGPT - Vulnerability Assessment Process and Risk Reports (68:04)
Automating Pentetration Test Plans and Threat Mapping (57:33)
Create Agents and Function Calling for any LLM (Use Case: Query NVD for CVEs) (61:59)
Red Teaming Using White Rabbit Neo LLM, LM Studio, and Shell GPT - Part 1
Red Teaming Using White Rabbit Neo LLM, LM Studio, and Shell GPT - Part 2
Creating a Full-Stack App with GPT-Pilot - Part 1
Creating a Full-Stack App with GPT-Pilot - Part 2
Using OpenAI Assistants for RAG - Part 1 (64:25)
Using OpenAI Assistants for RAG - Part 2 (51:22)
Automating Exploits with GPT-4 - Part 1
Deploy a PRIVATE CHATGPT CLONE in Your Company
Auto Generate a Complete IR Plan wth Ollama and OpenAI GPT (47:56)
Getting Started: ChatGPT, the OpenAI API, and Prompt Engineering
Getting Started with ChatGPT, Claude 2, and OpenAI - Part 1 (67:06)
Getting Started with ChatGPT, Claude 2, and OpenAI - Part 2 (67:30)
Formatting ChatGPT (and Claude 2) Output with Markdown and Tables (52:45)
Setting Up Your OpenAI API Key and Interacting with the API Using Python (41:10)
Using Files and Prompt Variables with the OpenAI API (48:21)
Prompt Engineering Techniques - Part 1 (50:10)
Prompt Engineering Techniques - Part 2 (54:55)
Introduction to Hugging Face and LangChain (32:44)
Getting Started with LangChain (63:13)
BONUS CONTENT: Setting Up Virtual Box and Kali Linux (7:44)
BONUS CONTENT: Installing VS Code (10:51)
BONUS CONTENT: Setting Up Python on Kali Linux (13:27)
BONUS CONTENT: Setting Up Python on Windows (2:26)
BONUS CONTENT: Installing Python, Homebrew, Conda, and VS Code on MacOS (4:22)
Vulnerability Assessment
Creating Vulnerability Assessment Plans (57:23)
Threat Assessment using ChatGPT and MITRE ATT&CK Framework (14:03)
Generating Command Prompts with ChatGPT and Claude 2 (37:12)
Creating a Kali Linux Terminal "Genie" with the OpenAI API (26:07)
Analyzing Vulnerability Assessment Reports using ChatGPT & Claude 2 (27:31)
Jailbreaking ChatGPT to Create Red Teaming/Penetration Testing Content (25:57)
Generating Scenarios with MITRE ATT&CK and the OpenAI API (35:47)
Building and Running Local Interfaces and Models - Part 1 (31:58)
Building and Running Local Interfaces and Models - Part 2 (+Bonus Super Prompt) (67:13)
Analyzing Vulnerability Assessment Reports using LangChain (17:48)
Security Awareness and Training
Using ChatGPT and the OpenAI API for Cybersecurity Training, Awareness, and Studying (53:35)
Code Analysis and Secure Development
Secure Software Development Lifecycle (SSDLC) Planning (Planning Phase)
Security Requirement Generation (Requirements Phase)
Generating Secure Coding Guidelines (Design Phase)
Analyzing Code for Security Flaws and Generating Custom Security Testing Scripts (Testing Phase)
Generating Code Comments and Documentation (Deployment/Maintenance Phase)
Governance, Risk, and Compliance (GRC)
Security policy and procedure generation
ChatGPT-assisted compliance gap analysis
ChatGPT-guided internal and external audit preparation
Staying up-to-date with regulatory changes
Creating a risk assessment process
ChatGPT-assisted cyber threat modeling
ChatGPT-assisted risk ranking and prioritization
Generating risk mitigation strategies
Building risk assessment reports
Enhancing risk communication with ChatGPT-generated visuals
Threat Monitoring and Detection
Threat intelligence analysis
Real-time threat monitoring
Multi-source threat intelligence aggregation
ChatGPT-assisted threat classification
Detecting advanced persistent threats (APTs) using ChatGPT
Enhancing threat detection with ChatGPT-generated IoCs
Building custom threat detection rules
Network traffic analysis and anomaly detection
Social engineering and phishing detection
Log and event analysis
Incident Response
ChatGPT-assisted incident analysis and triage
Real-time cybersecurity incident response suggestions
Generating incident response playbooks
Incident response communication
Creating and facilitating IR tabletop exercises
Post-incident review and lessons learned
Open-Source Intelligence (OSINT)
Social media and public data OSINT
OSINT for job postings and employee profiling
Harvesting company data
Creating Google Dorks
Creating Shodan Dorks
Domain and IP address reconnaissance
Automated OSINT
Penetration Testing
ChatGPT-powered network scanning
Generating custom payloads with ChatGPT
ChatGPT-guided vulnerability exploitation
Social engineering attack simulation
Developing red team scenarios using ChatGPT
Wireless network penetration testing
Web application penetration testing with ChatGPT
Automated penetration testing assistant
Creating custom ChatGPT-powered red team tools
Advanced Techniques and Tips
Building a ChatGPT-powered Kali Linux terminal
Malware analysis
Reverse engineering
Training models with drinkwater.ai
Training models with Hugging Face
Auto Agents with LangChain
Localizing LLMs and generative AI for Privacy
Working with open source LLMs
Training models with drinkwater.ai
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock