Educational Resources

91 resources found
Clear

A guide to advanced prompt engineering techniques for cyber security operations, focusing on leveraging generative AI and large language models like C...

Youtube_video intermediate
AI Analysis: This video provides advanced prompt engineering techniques specifically tailored for cybersecurity p...

Introduces Artificial Intelligence (AI) and Large Language Models (LLMs) in cybersecurity, covering threats, vulnerabilities, and mitigation strategie...

Online_course intermediate
AI Analysis: Good quality resource with solid content relevance. Highly relevant to AI and cybersecurity.

Provides hands-on training in AI security, focusing on red teaming for large language models (LLMs).

Online_course intermediate
AI Analysis: Good quality resource with solid content relevance. Highly relevant to AI and cybersecurity.

Focuses on finding and exploiting vulnerabilities in AI and LLM systems with both theory and practical lab sections, aligned with the OWASP Top 10 LLM...

Online_course intermediate
AI Analysis: Good quality resource with solid content relevance. Highly relevant to AI and cybersecurity.

Educational resource for Prompt Engineering for Security

Online_course intermediate
AI Analysis: Good quality resource with solid content relevance. Highly relevant to AI and cybersecurity.

Educational resource for Prompt Engineering for Security

Online_course intermediate
AI Analysis: Good quality resource with solid content relevance. Highly relevant to AI and cybersecurity.

A strategic framework for safeguarding large language model (LLM) systems through lifecycle-based adversarial testing. Identifies emerging risks like ...

Documentation intermediate
AI Analysis: Good quality resource with solid content relevance. Highly relevant to AI and cybersecurity.

This video discusses the concept of vibe coding, its adoption in modern development workflows, and strategies for increasing development velocity whil...

Youtube_video intermediate
AI Analysis: This video provides comprehensive coverage of enterprise security operations, featuring practical de...

Official NIST standards for post-quantum cryptographic algorithms including ML-KEM, ML-DSA, and SLH-DSA.

Documentation intermediate
AI Analysis: Good quality resource with solid source credibility. From a highly credible source.

Official NIST publication defining Zero Trust Architecture principles and implementation guidance

Documentation intermediate
AI Analysis: Analysis failed - unable to process resource content

AWS implementation guide for Zero Trust architecture in cloud environments

Documentation intermediate
AI Analysis: Good quality resource with solid source credibility. From a highly credible source.

Guide to using AI assistance for creating and optimizing Sigma detection rules in SIEM systems.

Guide intermediate
AI Analysis: Good quality resource with solid source credibility. From a highly credible source.

Comprehensive tutorial covering everything from basic chatbots to advanced multi-agent systems and real-world integrations.

Youtube_video intermediate
AI Analysis: This video provides comprehensive coverage of ai and machine learning in cybersecurity, featuring pr...

Learn to craft effective prompts for AI-powered security analysis

Course intermediate 150 min
AI Analysis: Specialized course focusing on prompt engineering for security use cases

A full guide on setting up a penetration testing lab in 2025, including top tools, software, and setup for safe and legal ethical hacking.

Youtube_video intermediate
AI Analysis: This video provides comprehensive coverage of ethical hacking and penetration testing, featuring pra...

Learn how to effectively use ChatGPT and AI tools in cybersecurity, ethical hacking, and penetration testing.

Youtube_video intermediate
AI Analysis: This video provides comprehensive coverage of ai and machine learning in cybersecurity, featuring pr...

Ryan Munsch introduces AI orchestration in Microsoft Security Copilot, explaining how it uses retrieval augmented generation (RAG) to refine prompts a...

Youtube_video intermediate
AI Analysis: This video provides insights into artificial intelligence in cybersecurity, covering practical appli...

Dave Johnson, Senior Threat Intelligence Advisor at Feedly, discusses his journey in cyber threat intelligence and how he uses large language models (...

Youtube_video intermediate
AI Analysis: This video provides insights into artificial intelligence in cybersecurity, covering practical appli...

See how Retrieval-Augmented Generation (RAG) transforms raw data into actionable intelligence for incident response.

Youtube_video intermediate
AI Analysis: This video provides insights into artificial intelligence in cybersecurity, covering practical appli...

Learn how Zoom is adopting defense in depth for a world of constant code changes, rising AI-driven threats, and growing attack surfaces.

Youtube_video intermediate
AI Analysis: This video provides comprehensive coverage of ai and machine learning in cybersecurity, featuring pr...