computer-scienceangular-roadmapbackend-roadmapblockchain-roadmapdba-roadmapdeveloper-roadmapdevops-roadmapfrontend-roadmapgo-roadmaphactoberfestjava-roadmapjavascript-roadmapnodejs-roadmappython-roadmapqa-roadmapreact-roadmaproadmapstudy-planvue-roadmapweb3-roadmap
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
322 lines
6.8 KiB
322 lines
6.8 KiB
{ |
|
"R9DQNc0AyAQ2HLpP4HOk6": { |
|
"title": "AI Security Fundamentals", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"fNTb9y3zs1HPYclAmu_Wv": { |
|
"title": "Why Red Team AI Systems?", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"HFJIYcI16OMyM77fAw9af": { |
|
"title": "Introduction", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"1gyuEV519LjN-KpROoVwv": { |
|
"title": "Ethical Considerations", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"Irkc9DgBfqSn72WaJqXEt": { |
|
"title": "Role of Red Teams", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"NvOJIv36Utpm7_kOZyr79": { |
|
"title": "Supervised Learning", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"ZC0yKsu-CJC-LZKKo2pLD": { |
|
"title": "Unsupervised Learning", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"Xqzc4mOKsVzwaUxLGjHya": { |
|
"title": "Reinforcement Learning", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"RuKzVhd1nZphCrlW1wZGL": { |
|
"title": "Neural Networks", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"3XJ-g0KvHP75U18mxCqgw": { |
|
"title": "Generative Models", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"8K-wCn2cLc7Vs_V4sC3sE": { |
|
"title": "Large Language Models", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"gx4KaFqKgJX9n9_ZGMqlZ": { |
|
"title": "Prompt Engineering", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"WZkIHZkV2qDYbYF9KBBRi": { |
|
"title": "Confidentiality, Integrity, Availability", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"RDOaTBWP3aIJPUp_kcafm": { |
|
"title": "Threat Modeling", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"MupRvk_8Io2Hn7yEvU663": { |
|
"title": "Risk Management", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"887lc3tWCRH-sOHSxWgWJ": { |
|
"title": "Vulnerability Assessment", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"Ds8pqn4y9Npo7z6ubunvc": { |
|
"title": "Jailbreak Techniques", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"j7uLLpt8MkZ1rqM7UBPW4": { |
|
"title": "Safety Filter Bypasses", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"XOrAPDRhBvde9R-znEipH": { |
|
"title": "Prompt Injection", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"1Xr7mxVekeAHzTL7G4eAZ": { |
|
"title": "Prompt Hacking", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"5zHow4KZVpfhch5Aabeft": { |
|
"title": "Direct", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"3_gJRtJSdm2iAfkwmcv0e": { |
|
"title": "Indirect", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"G1u_Kq4NeUsGX2qnUTuJU": { |
|
"title": "Countermeasures", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"vhBu5x8INTtqvx6vcYAhE": { |
|
"title": "Code Injection", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"uBXrri2bXVsNiM8fIHHOv": { |
|
"title": "Model Vulnerabilities", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"QFzLx5nc4rCCD8WVc20mo": { |
|
"title": "Model Weight Stealing", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"DQeOavZCoXpF3k_qRDABs": { |
|
"title": "Unauthorized Access", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"nD0_64ELEeJSN-0aZiR7i": { |
|
"title": "Data Poisoning", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"xjlttOti-_laPRn8a2fVy": { |
|
"title": "Adversarial Examples", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"iE5PcswBHnu_EBFIacib0": { |
|
"title": "Model Inversion", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"2Y0ZO-etpv3XIvunDLu-W": { |
|
"title": "Adversarial Training", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"6gEHMhh6BGJI-ZYN27YPW": { |
|
"title": "Robust Model Design", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"7Km0mFpHguHYPs5UhHTsM": { |
|
"title": "Continuous Monitoring", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"aKzai0A8J55-OBXTnQih1": { |
|
"title": "Insecure Deserialization", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"kgDsDlBk8W2aM6LyWpFY8": { |
|
"title": "Remote Code Execution", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"nhUKKWyBH80nyKfGT8ErC": { |
|
"title": "Infrastructure Security", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"Tszl26iNBnQBdBEWOueDA": { |
|
"title": "API Protection", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"J7gjlt2MBx7lOkOnfGvPF": { |
|
"title": "Authentication", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"JQ3bR8odXJfd-1RCEf3-Q": { |
|
"title": "Authentication", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"0bApnJTt-Z2IUf0X3OCYf": { |
|
"title": "Black Box Testing", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"Mrk_js5UVn4dRDw-Yco3Y": { |
|
"title": "White Box Testing", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"ZVNAMCP68XKRXVxF2-hBc": { |
|
"title": "Grey Box Testing", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"LVdYN9hyCyNPYn2Lz1y9b": { |
|
"title": "Automated vs Manual", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"65Lo60JQS5YlvvQ6KevXt": { |
|
"title": "Continuous Testing", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"c8n8FcYKDOgPLQvV9xF5J": { |
|
"title": "Testing Platforms", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"59lkLcoqV4gq7f8Zm0X2p": { |
|
"title": "Monitoring Solutions", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"et1Xrr8ez-fmB0mAq8W_a": { |
|
"title": "Benchmark Datasets", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"C1zO2xC0AqyV53p2YEPWg": { |
|
"title": "Custom Testing Scripts", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"BLnfNlA0C4yzy1dvifjwx": { |
|
"title": "Reporting Tools", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"s1xKK8HL5-QGZpcutiuvj": { |
|
"title": "Specialized Courses", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"HHjsFR6wRDqUd66PMDE_7": { |
|
"title": "Industry Credentials", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"MmwwRK4I9aRH_ha7duPqf": { |
|
"title": "Lab Environments", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"2Imb64Px3ZQcBpSQjdc_G": { |
|
"title": "CTF Challenges", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"DpYsL0du37n40toH33fIr": { |
|
"title": "Red Team Simulations", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"LuKnmd9nSz9yLbTU_5Yp2": { |
|
"title": "Conferences", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"ZlR03pM-sqVFZNhD1gMSJ": { |
|
"title": "Research Groups", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"Smncq-n1OlnLAY27AFQOO": { |
|
"title": "Forums", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"xJYTRbPxMn0Xs5ea0Ygn6": { |
|
"title": "LLM Security Testing", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"FVsKivsJrIb82B0lpPmgw": { |
|
"title": "Agentic AI Security", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"KAcCZ3zcv25R6HwzAsfUG": { |
|
"title": "Responsible Disclosure", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"-G8v_CNa8wO_g-46_RFQo": { |
|
"title": "Emerging Threats", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"soC-kcem1ISbnCQMa6BIB": { |
|
"title": "Advanced Techniques", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"VmaIHVsCpq2um_0cA33V3": { |
|
"title": "Research Opportunities", |
|
"description": "", |
|
"links": [] |
|
}, |
|
"WePO66_4-gNcSdE00WKmw": { |
|
"title": "Industry Standards", |
|
"description": "", |
|
"links": [] |
|
} |
|
} |