Torrent details for "AI Agents for Cybersecurity 2026" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
604.5 MB
Info Hash:
FBF9AC7012FF3A9546F091B716F8F8C193030E80
Added By:
Added:
March 19, 2026, 5:40 p.m.
Stats:
|
(Last updated: March 19, 2026, 6:55 p.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 180 bytes |
| 01. Welcome and course goals.mp4 | 16.9 MB |
| 01. Welcome and course goals.srt | 5.0 KB |
| 01. Chapter introduction.mp4 | 13.0 MB |
| 01. Chapter introduction.srt | 3.8 KB |
| 02. The transformative potential of AI and LLMs in cybersecurity.mp4 | 15.1 MB |
| 02. The transformative potential of AI and LLMs in cybersecurity.srt | 7.0 KB |
| 03. Defining large language models (LLMs) and their architectures.mp4 | 29.2 MB |
| 03. Defining large language models (LLMs) and their architectures.srt | 13.1 KB |
| 04. Evolution of AI in cybersecurity From ML to agentic AI.mp4 | 15.7 MB |
| 04. Evolution of AI in cybersecurity From ML to agentic AI.srt | 7.2 KB |
| 01. What are AI agents Definition, characteristics, and workflow.mp4 | 16.3 MB |
| 01. What are AI agents Definition, characteristics, and workflow.srt | 6.8 KB |
| 02. LLMs as the “brain” of AI agents Capabilities and limitations.mp4 | 20.8 MB |
| 02. LLMs as the “brain” of AI agents Capabilities and limitations.srt | 8.7 KB |
| 03. Agent autonomy levels in cybersecurity.mp4 | 15.4 MB |
| 03. Agent autonomy levels in cybersecurity.srt | 7.7 KB |
| 04. Multi-agent systems Collaboration and complexity.mp4 | 12.1 MB |
| 04. Multi-agent systems Collaboration and complexity.srt | 6.4 KB |
| 05. Memory and learning in AI agents.mp4 | 13.1 MB |
| 05. Memory and learning in AI agents.srt | 6.0 KB |
| 06. Adapting LLMs for cybersecurity Fine-tuning, prompt engineering, and augmentation.mp4 | 15.0 MB |
| 06. Adapting LLMs for cybersecurity Fine-tuning, prompt engineering, and augmentation.srt | 7.5 KB |
| 01. Types of datasets in LLM for security Code-based, text-based, and combined.mp4 | 14.8 MB |
| 01. Types of datasets in LLM for security Code-based, text-based, and combined.srt | 9.2 KB |
| 02. Data pre-processing and representation for cybersecurity AI models.mp4 | 14.7 MB |
| 02. Data pre-processing and representation for cybersecurity AI models.srt | 9.2 KB |
| 03. Addressing data scarcity LLMs for data augmentation in cybersecurity.mp4 | 8.8 MB |
| 03. Addressing data scarcity LLMs for data augmentation in cybersecurity.srt | 2.5 KB |
| 01. Chapter introduction.mp4 | 12.4 MB |
| 01. Chapter introduction.srt | 3.6 KB |
| 02. Real-time detection of cyber threats with AI.mp4 | 14.9 MB |
| 02. Real-time detection of cyber threats with AI.srt | 7.3 KB |
| 03. Automated vulnerability detection and analysis.mp4 | 14.6 MB |
| 03. Automated vulnerability detection and analysis.srt | 7.1 KB |
| 04. Malware analysis and classification with AI agents.mp4 | 12.3 MB |
| 04. Malware analysis and classification with AI agents.srt | 6.9 KB |
| 01. Network intrusion detection and attack classification.mp4 | 15.0 MB |
| 01. Network intrusion detection and attack classification.srt | 6.5 KB |
| 02. Detecting and defending against phishing attacks and deceptive language.mp4 | 13.8 MB |
| 02. Detecting and defending against phishing attacks and deceptive language.srt | 6.1 KB |
| 03. Leveraging AI for threat intelligence and attack surface management.mp4 | 13.5 MB |
| 03. Leveraging AI for threat intelligence and attack surface management.srt | 7.4 KB |
| 01. AI for System Log Analysis and Anomaly Detection.mp4 | 14.1 MB |
| 01. AI for System Log Analysis and Anomaly Detection.srt | 7.7 KB |
| 02. Reverse Engineering and Binary Analysis with AI Assistance.mp4 | 13.1 MB |
| 02. Reverse Engineering and Binary Analysis with AI Assistance.srt | 8.3 KB |
| 03. AI for understanding security and privacy policies.mp4 | 14.9 MB |
| 03. AI for understanding security and privacy policies.srt | 9.0 KB |
| 01. Chapter introduction.mp4 | 8.2 MB |
| 01. Chapter introduction.srt | 3.3 KB |
| 02. Automating vulnerability repair and patch generation.mp4 | 13.5 MB |
| 02. Automating vulnerability repair and patch generation.srt | 6.8 KB |
| 03. Streamlining incident response workflows and playbooks.mp4 | 13.7 MB |
| 03. Streamlining incident response workflows and playbooks.srt | 7.2 KB |
| 04. Post-attack analysis and root cause identification with AI.mp4 | 13.1 MB |
| 04. Post-attack analysis and root cause identification with AI.srt | 8.0 KB |
| 01. AI for proactive defense and threat hunting.mp4 | 9.1 MB |
| 01. AI for proactive defense and threat hunting.srt | 6.0 KB |
| 02. AI-powered risk management and predictive analytics.mp4 | 12.6 MB |
| 02. AI-powered risk management and predictive analytics.srt | 6.7 KB |
| 03. Optimizing cybersecurity investments and compliance automation.mp4 | 13.8 MB |
| 03. Optimizing cybersecurity investments and compliance automation.srt | 7.9 KB |
| 04. Adaptive decision-making and continuous learning in SOC agents.mp4 | 12.0 MB |
| 04. Adaptive decision-making and continuous learning in SOC agents.srt | 8.2 KB |
| 01. Chapter introduction.mp4 | 11.6 MB |
| 01. Chapter introduction.srt | 3.7 KB |
| 02. Overview of AI agent security challenges The four knowledge gaps.mp4 | 15.8 MB |
| 02. Overview of AI agent security challenges The four knowledge gaps.srt | 7.1 KB |
| 03. Inherent AI-related vulnerabilities Adversarial AI, data poisoning, and misalignment.mp4 | 14.6 MB |
| 03. Inherent AI-related vulnerabilities Adversarial AI, data poisoning, and misalignment.srt | 8.0 KB |
| 04. Agent-specific threats Prompt injection, jailbreaking, and supply chain vulnerabilities.mp4 | 10.0 MB |
| 04. Agent-specific threats Prompt injection, jailbreaking, and supply chain vulnerabilities.srt | 6.8 KB |
| 01. Challenges in LLM interpretability, trustworthiness, and ethical usage.mp4 | 7.2 MB |
| 01. Challenges in LLM interpretability, trustworthiness, and ethical usage.srt | 2.7 KB |
| 02. Addressing bias and fairness in AI agents.mp4 | 14.4 MB |
| 02. Addressing bias and fairness in AI agents.srt | 6.7 KB |
| 03. Designing responsible AI Governance models and human-in-the-loop (HITL).mp4 | 13.0 MB |
| 03. Designing responsible AI Governance models and human-in-the-loop (HITL).srt | 6.3 KB |
| 01. Expanding LLM capabilities and multimodal AI.mp4 | 16.0 MB |
| 01. Expanding LLM capabilities and multimodal AI.srt | 6.6 KB |
| 02. Security for LLMs and proactive self-defense.mp4 | 17.2 MB |
| 02. Security for LLMs and proactive self-defense.srt | 6.9 KB |
| 03. The roadmap for AI agents in cybersecurity Opportunities and future research.mp4 | 16.7 MB |
| 03. The roadmap for AI agents in cybersecurity Opportunities and future research.srt | 7.1 KB |
| 04. Course wrap-up video.mp4 | 12.4 MB |
| 04. Course wrap-up video.srt | 2.7 KB |
| Bonus Resources.txt | 70 bytes |
Name
DL
Uploader
Size
S/L
Added
-
981.3 MB
[24
/
19]
2024-10-24
| Uploaded by FreeCourseWeb | Size 981.3 MB | Health [ 24 /19 ] | Added 2024-10-24 |
-
595.9 MB
[3
/
1]
2025-06-21
| Uploaded by freecoursewb | Size 595.9 MB | Health [ 3 /1 ] | Added 2025-06-21 |
-
753.2 MB
[1
/
5]
2025-07-31
| Uploaded by freecoursewb | Size 753.2 MB | Health [ 1 /5 ] | Added 2025-07-31 |
-
604.5 MB
[3
/
20]
2026-03-19
| Uploaded by freecoursewb | Size 604.5 MB | Health [ 3 /20 ] | Added 2026-03-19 |
NOTE
SOURCE: AI Agents for Cybersecurity 2026
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


