Roadmap to becoming a developer in 2022
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 

322 lines
6.8 KiB

{
"R9DQNc0AyAQ2HLpP4HOk6": {
"title": "AI Security Fundamentals",
"description": "",
"links": []
},
"fNTb9y3zs1HPYclAmu_Wv": {
"title": "Why Red Team AI Systems?",
"description": "",
"links": []
},
"HFJIYcI16OMyM77fAw9af": {
"title": "Introduction",
"description": "",
"links": []
},
"1gyuEV519LjN-KpROoVwv": {
"title": "Ethical Considerations",
"description": "",
"links": []
},
"Irkc9DgBfqSn72WaJqXEt": {
"title": "Role of Red Teams",
"description": "",
"links": []
},
"NvOJIv36Utpm7_kOZyr79": {
"title": "Supervised Learning",
"description": "",
"links": []
},
"ZC0yKsu-CJC-LZKKo2pLD": {
"title": "Unsupervised Learning",
"description": "",
"links": []
},
"Xqzc4mOKsVzwaUxLGjHya": {
"title": "Reinforcement Learning",
"description": "",
"links": []
},
"RuKzVhd1nZphCrlW1wZGL": {
"title": "Neural Networks",
"description": "",
"links": []
},
"3XJ-g0KvHP75U18mxCqgw": {
"title": "Generative Models",
"description": "",
"links": []
},
"8K-wCn2cLc7Vs_V4sC3sE": {
"title": "Large Language Models",
"description": "",
"links": []
},
"gx4KaFqKgJX9n9_ZGMqlZ": {
"title": "Prompt Engineering",
"description": "",
"links": []
},
"WZkIHZkV2qDYbYF9KBBRi": {
"title": "Confidentiality, Integrity, Availability",
"description": "",
"links": []
},
"RDOaTBWP3aIJPUp_kcafm": {
"title": "Threat Modeling",
"description": "",
"links": []
},
"MupRvk_8Io2Hn7yEvU663": {
"title": "Risk Management",
"description": "",
"links": []
},
"887lc3tWCRH-sOHSxWgWJ": {
"title": "Vulnerability Assessment",
"description": "",
"links": []
},
"Ds8pqn4y9Npo7z6ubunvc": {
"title": "Jailbreak Techniques",
"description": "",
"links": []
},
"j7uLLpt8MkZ1rqM7UBPW4": {
"title": "Safety Filter Bypasses",
"description": "",
"links": []
},
"XOrAPDRhBvde9R-znEipH": {
"title": "Prompt Injection",
"description": "",
"links": []
},
"1Xr7mxVekeAHzTL7G4eAZ": {
"title": "Prompt Hacking",
"description": "",
"links": []
},
"5zHow4KZVpfhch5Aabeft": {
"title": "Direct",
"description": "",
"links": []
},
"3_gJRtJSdm2iAfkwmcv0e": {
"title": "Indirect",
"description": "",
"links": []
},
"G1u_Kq4NeUsGX2qnUTuJU": {
"title": "Countermeasures",
"description": "",
"links": []
},
"vhBu5x8INTtqvx6vcYAhE": {
"title": "Code Injection",
"description": "",
"links": []
},
"uBXrri2bXVsNiM8fIHHOv": {
"title": "Model Vulnerabilities",
"description": "",
"links": []
},
"QFzLx5nc4rCCD8WVc20mo": {
"title": "Model Weight Stealing",
"description": "",
"links": []
},
"DQeOavZCoXpF3k_qRDABs": {
"title": "Unauthorized Access",
"description": "",
"links": []
},
"nD0_64ELEeJSN-0aZiR7i": {
"title": "Data Poisoning",
"description": "",
"links": []
},
"xjlttOti-_laPRn8a2fVy": {
"title": "Adversarial Examples",
"description": "",
"links": []
},
"iE5PcswBHnu_EBFIacib0": {
"title": "Model Inversion",
"description": "",
"links": []
},
"2Y0ZO-etpv3XIvunDLu-W": {
"title": "Adversarial Training",
"description": "",
"links": []
},
"6gEHMhh6BGJI-ZYN27YPW": {
"title": "Robust Model Design",
"description": "",
"links": []
},
"7Km0mFpHguHYPs5UhHTsM": {
"title": "Continuous Monitoring",
"description": "",
"links": []
},
"aKzai0A8J55-OBXTnQih1": {
"title": "Insecure Deserialization",
"description": "",
"links": []
},
"kgDsDlBk8W2aM6LyWpFY8": {
"title": "Remote Code Execution",
"description": "",
"links": []
},
"nhUKKWyBH80nyKfGT8ErC": {
"title": "Infrastructure Security",
"description": "",
"links": []
},
"Tszl26iNBnQBdBEWOueDA": {
"title": "API Protection",
"description": "",
"links": []
},
"J7gjlt2MBx7lOkOnfGvPF": {
"title": "Authentication",
"description": "",
"links": []
},
"JQ3bR8odXJfd-1RCEf3-Q": {
"title": "Authentication",
"description": "",
"links": []
},
"0bApnJTt-Z2IUf0X3OCYf": {
"title": "Black Box Testing",
"description": "",
"links": []
},
"Mrk_js5UVn4dRDw-Yco3Y": {
"title": "White Box Testing",
"description": "",
"links": []
},
"ZVNAMCP68XKRXVxF2-hBc": {
"title": "Grey Box Testing",
"description": "",
"links": []
},
"LVdYN9hyCyNPYn2Lz1y9b": {
"title": "Automated vs Manual",
"description": "",
"links": []
},
"65Lo60JQS5YlvvQ6KevXt": {
"title": "Continuous Testing",
"description": "",
"links": []
},
"c8n8FcYKDOgPLQvV9xF5J": {
"title": "Testing Platforms",
"description": "",
"links": []
},
"59lkLcoqV4gq7f8Zm0X2p": {
"title": "Monitoring Solutions",
"description": "",
"links": []
},
"et1Xrr8ez-fmB0mAq8W_a": {
"title": "Benchmark Datasets",
"description": "",
"links": []
},
"C1zO2xC0AqyV53p2YEPWg": {
"title": "Custom Testing Scripts",
"description": "",
"links": []
},
"BLnfNlA0C4yzy1dvifjwx": {
"title": "Reporting Tools",
"description": "",
"links": []
},
"s1xKK8HL5-QGZpcutiuvj": {
"title": "Specialized Courses",
"description": "",
"links": []
},
"HHjsFR6wRDqUd66PMDE_7": {
"title": "Industry Credentials",
"description": "",
"links": []
},
"MmwwRK4I9aRH_ha7duPqf": {
"title": "Lab Environments",
"description": "",
"links": []
},
"2Imb64Px3ZQcBpSQjdc_G": {
"title": "CTF Challenges",
"description": "",
"links": []
},
"DpYsL0du37n40toH33fIr": {
"title": "Red Team Simulations",
"description": "",
"links": []
},
"LuKnmd9nSz9yLbTU_5Yp2": {
"title": "Conferences",
"description": "",
"links": []
},
"ZlR03pM-sqVFZNhD1gMSJ": {
"title": "Research Groups",
"description": "",
"links": []
},
"Smncq-n1OlnLAY27AFQOO": {
"title": "Forums",
"description": "",
"links": []
},
"xJYTRbPxMn0Xs5ea0Ygn6": {
"title": "LLM Security Testing",
"description": "",
"links": []
},
"FVsKivsJrIb82B0lpPmgw": {
"title": "Agentic AI Security",
"description": "",
"links": []
},
"KAcCZ3zcv25R6HwzAsfUG": {
"title": "Responsible Disclosure",
"description": "",
"links": []
},
"-G8v_CNa8wO_g-46_RFQo": {
"title": "Emerging Threats",
"description": "",
"links": []
},
"soC-kcem1ISbnCQMa6BIB": {
"title": "Advanced Techniques",
"description": "",
"links": []
},
"VmaIHVsCpq2um_0cA33V3": {
"title": "Research Opportunities",
"description": "",
"links": []
},
"WePO66_4-gNcSdE00WKmw": {
"title": "Industry Standards",
"description": "",
"links": []
}
}