Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The AI for Ethical Hacking & Cybersecurity Bootcamp
Section 1: Welcome!
Introduction (4:32)
Exercise: Meet Your Classmates and Instructor
The Correct Path (8:54)
Prerequisites
Understanding Your Video Player
Set Your Learning Streak Goal
Section 2: Lab Setup
Kali Linux Install (16:00)
Note: Optional Installation
Section 3: Prompting for Cybersecurity and Ethical Hacking
Simple ChatGPT Prompts (5:42)
Good vs. Bad Prompt Full Network Recon (24:53)
Few-Shot Prompting Downgrading Aggressive Commands and Analyzing Logs (17:36)
Let's Have Some Fun (+ More Resources)
Section 4: Advanced Prompting with ChatGPT for Cybersecurity and Ethical Hacking
Assessment of Privilege Escalation Avenues with ChatGPT (7:04)
Confirming and Prioritizing Web Vulnerabilities (6:18)
Writing Rules for SQL Injection and Analyzing Apache Logs for SQLi (6:00)
Hardening SSH Configuration File (7:23)
Unlimited Updates
Section 5: How to Break AI with Prompt Injection and Jailbreak
Prompt Injection & Jailbreak (4:30)
Gandalf Prompt Injection Lab (11:43)
Indirect Prompt Injection (15:06)
Loading Guardrails for Prompt Injection (7:27)
Implement a New Life System
Section 6: PenTest++ AI Augmented Penetration Testing
PenTest++ Theory (5:27)
Performing AI Augmented Pentest (30:01)
Course Check-In
Section 7: Implementing Open AI API Inside Kali Linux Tools
OpenAI API and ShellGPT (13:17)
Automating Entire Attacks with ShellGPT (13:34)
ShellGPT for Recon, Payload Creation and Vulnerability Analysis (12:01)
Section 8: Machine Learning with Python for Cybersecurity and Ethical Hacking
Python and ML for Cybersecurity and Ethical Hackers (3:18)
Installing ML Libraries for Malicious IP Activity Detector (9:09)
Predicting New Entries in Our Malicious Activity Detector (14:00)
Section 9: Coding Project 1 - Detecting Malicious Bash Commands
Malicious Bash Command Detector with Random Forest Classifier (10:09)
Flagging Command as Negative & Positive (6:39)
Section 10: Coding Project 2 - Langchain and OpenAI API for Python Tools
Implementing OpenAI Api Key In Python Recon Programs (12:16)
Summarizing PDFs with LLM for Reconnaissance (14:28)
Section 11: Coding Project 3 - Creating a Simple AI Attacker Agent
Creating a Simple AI Attacker Agent (11:55)
Section 12: Coding Project 4 - Exploiting AI Model Image Digit Classifier
Introduction to MITRE ATLAS (3:36)
Creating AI Digit Image Classifier Model (7:26)
Exploiting the Model (27:36)
Mapping Vulnerability to MITRE ATLAS and Writing Report (6:11)
Exercise: Imposter Syndrome (2:55)
Section 13: Coding Project 5 - Creating AI Agent
Creating Tools for Our Agent (16:36)
Initializing Our Agent (5:22)
Testing Our Agent (14:07)
Section 14: Crafting AI Generated Payloads
Using AI For SQL Injection (8:45)
AI Generated Reverse Shell (4:26)
Using AI for Exploit Development and Fuzzing (10:23)
Using AI for XSS (Cross-Site Scripting) Attacks (6:27)
Section 15: AI in Social Engineering and Phishing
What is Social Engineering and Phishing (7:29)
Voice Cloning with ElevenLabs (10:09)
AI Voice Generating with Resemble (2:40)
Creating Deepfakes with D-ID (5:09)
How To Recognize these Types of Scams (5:55)
Section 16: AI/ML Application in Security
AI Based SIEM (Security Information and Event Management) Systems (6:19)
Firewalls with AI (6:06)
Email Filtering With AI (4:41)
AI in IAM (Identity and Access Management) (6:14)
IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) with AI (8:00)
Section 17: Common Vulnerabilities with AI
Data Poisoning (4:46)
Data Bias (4:10)
Model Vulnerabilities (6:52)
Ethical Concerns (4:30)
Where To Go From Here?
Thank You! (1:17)
Review This Course!
Become An Alumni
Learning Guideline
ZTM Events Every Month
LinkedIn Endorsements
Automating Entire Attacks with ShellGPT
This lecture is available exclusively for ZTM Academy members.
If you're already a member,
you'll need to login
.
Join ZTM To Unlock All Lectures