What You Need to Know Before
You Start

Starts 3 June 2025 07:52

Ends 3 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

Ethical Hacking against and with AI/LLM/ML (Lite Version!)

Become professional in AI and LLM Penetration Testing and Vulnerability Discovery (Lite Version!)
via Udemy

4052 Courses


4 hours 48 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Paid Course

Optional upgrade avallable

Overview

Become professional in AI and LLM Penetration Testing and Vulnerability Discovery (Lite Version!) What you'll learn:

AI/LLM vulnerabilitiesget to a professional level in AI/LLM penetration testingget to a professional level in AI/LLM bug bountyBasics of AI/LLMAI/LLM AttacksAI/LLM FrameworksAI/LLM Prompt InjectionAI/LLM Insecure Output HandlingAI/LLM Training Data PoisoningAI/LLM Denial of ServiceAI/LLM Supply ChainAI/LLM Permission IssuesAI/LLM Data LeakageAI/LLM Excessive AgencyAI/LLM OverrelianceAI/LLM Insecure PluginsAI/LLM Threat ModelUsing AI for Penetration Testing / Ethical HackingThe Yolo AI Tool Ethical Hacking against and with AI/LLM/ML Training Course (Lite Version!)Welcome to this course of Ethical Hacking and Penetration Testing Artificial Intelligence (AI) and Large Language Models (LLM) Training course. Important note:

This course is NOT teaching the actual usage of Burp Suite and its features.

Your instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience.

Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP.

He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.This course has a both theory and practical lab sections with a focus on finding and exploiting vulnerabilities in AI and LLM systems and applications. The training is aligned with the OWASP Top 10 LLM vulnerability classes.

Martin is solving all the LLM labs from Portswigger in addition to a lot of other labs and showcases. The videos are easy to follow along and replicate.

There is also a dedicate section on how to use AI for Penetration Testing / Bug Bounty Hunting and Ethical Hacking. The course features the following:

· AI/LLM Introduction · AI/LLM Attacks· AI/LLM Frameworks / writeups· AI LLM01:

Prompt Injection· AI LLM02:

Insecure Output Handling· AI LLM03:

Training Data Poisoning· AI LLM04:

Denial of Service· AI LLM05:

Supply Chain· AI LLM06:

Permission Issues· AI LLM07:

Data Leakage· AI LLM08:

Excessive Agency· AI LLM09:

Overreliance· AI LLM10:

Insecure Plugins· Threat Model· Putting it all together· Using AI for Penetration Testing / Ethical Hacking· The Yolo AI Tool· Prompt Airlines CTF Walkthrough· AI Prompt Attack and Defense Game Tensortrust · ToolingNotes & DisclaimerPortswigger labs are a public and a free service from Portswigger for anyone to use to sharpen their skills.

All you need is to sign up for a free account. I will update this course with new labs as they are published.

I will to respond to questions in a reasonable time frame. Learning Pen Testing / Bug Bounty Hunting is a lengthy process, so please don’t feel frustrated if you don’t find a bug right away.

Try to use Google, read Hacker One reports and research each feature in-depth. This course is for educational purposes only.

This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack.

Syllabus

  • Introduction to Ethical Hacking and AI/ML
  • Overview of Ethical Hacking Principles
    Introduction to AI, ML, and LLMs (Large Language Models)
    The role of AI in cybersecurity
  • Basics of Machine Learning for Security Applications
  • Understanding Machine Learning Models
    Common Algorithms and Techniques
    Overview of LLMs
  • Ethical Hacking with AI/ML Tools
  • Tools and Frameworks for AI/ML
    Case Studies: Successful AI-assisted Penetration Testing
    Automating Vulnerability Scanning with AI
  • Security Threats and Vulnerabilities in AI/ML Systems
  • Common Vulnerabilities in AI Systems
    Adversarial Attacks on ML Models
    Protecting Against Data Poisoning and Evasion Attacks
  • Ethical Considerations in AI/ML Hacking
  • Legal and Ethical Guidelines for Ethical Hackers
    Privacy Concerns with AI and LLMs
    Responsible Disclosure Practices
  • Practical Labs (Hands-On Sessions)
  • Setting Up a Secure Testing Environment
    Simulating AI-related Attack Scenarios
    Defensive Measures: Securing AI Systems
  • Case Studies and Real-world Examples
  • Analysis of High-profile AI/ML Security Breaches
    Lessons Learned from Cybersecurity Incidents Involving AI
  • Future Trends in AI and Cybersecurity
  • Emerging Threats and Challenges in AI Security
    Evolution of AI in Cyber Defense
    Preparing for the Impact of AI on Cybersecurity Practices
  • Course Conclusion and Certification
  • Review and Recap of Key Concepts
    Final Assessment and Feedback
    Certification and Next Steps in Ethical Hacking with AI

Taught by

Martin Voelk


Subjects

Information Security (InfoSec)