Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The AI for Ethical Hacking & Cybersecurity Bootcamp
Section 1: Welcome!
Introduction (4:32)
Exercise: Meet Your Classmates and Instructor
The Correct Path (8:54)
Prerequisites
Understanding Your Video Player
Set Your Learning Streak Goal
Section 2: Lab Setup
Kali Linux Install (16:00)
Note: Optional Installation
Section 3: Prompting for Cybersecurity and Ethical Hacking
Simple ChatGPT Prompts (5:42)
Good vs. Bad Prompt Full Network Recon (24:53)
Few-Shot Prompting Downgrading Aggressive Commands and Analyzing Logs (17:36)
Let's Have Some Fun (+ More Resources)
Section 4: Advanced Prompting with ChatGPT for Cybersecurity and Ethical Hacking
Assessment of Privilege Escalation Avenues with ChatGPT (7:04)
Confirming and Prioritizing Web Vulnerabilities (6:18)
Writing Rules for SQL Injection and Analyzing Apache Logs for SQLi (6:00)
Hardening SSH Configuration File (7:23)
Unlimited Updates
Section 5: How to Break AI with Prompt Injection and Jailbreak
Prompt Injection & Jailbreak (4:30)
Gandalf Prompt Injection Lab (11:43)
Indirect Prompt Injection (15:06)
Loading Guardrails for Prompt Injection (7:27)
Implement a New Life System
Section 6: PenTest++ AI Augmented Penetration Testing
PenTest++ Theory (5:27)
Performing AI Augmented Pentest (30:01)
Course Check-In
Section 7: Implementing Open AI API Inside Kali Linux Tools
OpenAI API and ShellGPT (13:17)
Automating Entire Attacks with ShellGPT (13:34)
ShellGPT for Recon, Payload Creation and Vulnerability Analysis (12:01)
Section 8: Machine Learning with Python for Cybersecurity and Ethical Hacking
Python and ML for Cybersecurity and Ethical Hackers (3:18)
Installing ML Libraries for Malicious IP Activity Detector (9:09)
Predicting New Entries in Our Malicious Activity Detector (14:00)
Section 9: Coding Project 1 - Detecting Malicious Bash Commands
Malicious Bash Command Detector with Random Forest Classifier (10:09)
Flagging Command as Negative & Positive (6:39)
Section 10: Coding Project 2 - Langchain and OpenAI API for Python Tools
Implementing OpenAI Api Key In Python Recon Programs (12:16)
Summarizing PDFs with LLM for Reconnaissance (14:28)
Section 11: Coding Project 3 - Creating a Simple AI Attacker Agent
Creating a Simple AI Attacker Agent (11:55)
Section 12: Coding Project 4 - Exploiting AI Model Image Digit Classifier
Introduction to MITRE ATLAS (3:36)
Creating AI Digit Image Classifier Model (7:26)
Exploiting the Model (27:36)
Mapping Vulnerability to MITRE ATLAS and Writing Report (6:11)
Exercise: Imposter Syndrome (2:55)
Section 13: Coding Project 5 - Creating AI Agent
Creating Tools for Our Agent (16:36)
Initializing Our Agent (5:22)
Testing Our Agent (14:07)
Section 14: Crafting AI Generated Payloads
Using AI For SQL Injection (8:45)
AI Generated Reverse Shell (4:26)
Using AI for Exploit Development and Fuzzing (10:23)
Using AI for XSS (Cross-Site Scripting) Attacks (6:27)
Section 15: AI in Social Engineering and Phishing
What is Social Engineering and Phishing (7:29)
Voice Cloning with ElevenLabs (10:09)
AI Voice Generating with Resemble (2:40)
Creating Deepfakes with D-ID (5:09)
How To Recognize these Types of Scams (5:55)
Section 16: AI/ML Application in Security
AI Based SIEM (Security Information and Event Management) Systems (6:19)
Firewalls with AI (6:06)
Email Filtering With AI (4:41)
AI in IAM (Identity and Access Management) (6:14)
IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) with AI (8:00)
Section 17: Common Vulnerabilities with AI
Data Poisoning (4:46)
Data Bias (4:10)
Model Vulnerabilities (6:52)
Ethical Concerns (4:30)
Where To Go From Here?
Thank You! (1:17)
Review This Course!
Become An Alumni
Learning Guideline
ZTM Events Every Month
LinkedIn Endorsements
Using AI for XSS (Cross-Site Scripting) Attacks
This lecture is available exclusively for ZTM Academy members.
If you're already a member,
you'll need to login
.
Join ZTM To Unlock All Lectures