Educational Resources
A guide to advanced prompt engineering techniques for cyber security operations, focusing on leveraging generative AI and large language models like C...
Introduces Artificial Intelligence (AI) and Large Language Models (LLMs) in cybersecurity, covering threats, vulnerabilities, and mitigation strategie...
Provides hands-on training in AI security, focusing on red teaming for large language models (LLMs).
Focuses on finding and exploiting vulnerabilities in AI and LLM systems with both theory and practical lab sections, aligned with the OWASP Top 10 LLM...
Educational resource for Prompt Engineering for Security
Educational resource for Prompt Engineering for Security
A strategic framework for safeguarding large language model (LLM) systems through lifecycle-based adversarial testing. Identifies emerging risks like ...
This video discusses the concept of vibe coding, its adoption in modern development workflows, and strategies for increasing development velocity whil...
Official NIST standards for post-quantum cryptographic algorithms including ML-KEM, ML-DSA, and SLH-DSA.
Official NIST publication defining Zero Trust Architecture principles and implementation guidance
AWS implementation guide for Zero Trust architecture in cloud environments
Guide to using AI assistance for creating and optimizing Sigma detection rules in SIEM systems.
Comprehensive tutorial covering everything from basic chatbots to advanced multi-agent systems and real-world integrations.
Learn to craft effective prompts for AI-powered security analysis
A full guide on setting up a penetration testing lab in 2025, including top tools, software, and setup for safe and legal ethical hacking.
Learn how to effectively use ChatGPT and AI tools in cybersecurity, ethical hacking, and penetration testing.
Ryan Munsch introduces AI orchestration in Microsoft Security Copilot, explaining how it uses retrieval augmented generation (RAG) to refine prompts a...
Dave Johnson, Senior Threat Intelligence Advisor at Feedly, discusses his journey in cyber threat intelligence and how he uses large language models (...
See how Retrieval-Augmented Generation (RAG) transforms raw data into actionable intelligence for incident response.
Learn how Zoom is adopting defense in depth for a world of constant code changes, rising AI-driven threats, and growing attack surfaces.