Udemy

How to use AI and LLMs for Offensive and Defensive Security

Enroll Now
  • 134 Students
  • Updated 4/2025
  • Certificate Available
4.7
(13 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
4 Hour(s) 20 Minute(s)
Language
English
Taught by
Martin Voelk
Certificate
  • Available
  • *The delivery and distribution of the certificate are subject to the policies and arrangements of the course provider.
Rating
4.7
(13 Ratings)

Course Overview

How to use AI and LLMs for Offensive and Defensive Security

Learn how to leverage AI/LLMs for your day-to-day job in both offensive and defensive security. Be ahead of the curve!

How to leverage AI and LLMs for both offensive and defensive Security

Your instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.

This course has a both theory and practical lab sections The videos are easy to follow along and replicate.

The course features the following:

AI/LLM Introduction

Models / UIs and local setup

Most common LLM Models

Privacy

RAG (Retrieval Augmented Generation)

Front Ends (Open WebUI, jan ai, lmstudio etc.)

Ollama

Huggingface

Prompting

Basics

Prompt Engineering

Zero-shot, few-shot, Chain of Thought

System Prompts

Make your own bots

Prompt leakage

Jailbreaking

Troubleshooting

API usage

Tools

Yolo

Fabric

LLM CLI


Burp AI Features

Explore Issue Feature

Explainer Feature

AI Login Sequence

Broken Access Control

Shadow Repeater

AI HTTP Analyzer

LM Report

Using AI/LLM for Offensive Security

Create Pentest bots and examples

Create Redteam bots and examples

HDI attack generation

C&C attack generation

Using AI/LLM for Defensive Security

Create Blue Team bots and examples

Incident Response bot

Tool support companion bots

Code analysis bots

Notes & Disclaimer

This course is for educational purposes only. This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack.

Course Content

  • 7 section(s)
  • 32 lecture(s)
  • Section 1 AI/LLM Introduction
  • Section 2 Models / UIs and local setup
  • Section 3 Prompting and Prompt Engineering
  • Section 4 Tools
  • Section 5 Offensive Security with AI
  • Section 6 Burp Suite AI Features
  • Section 7 Defensive Security with AI

What You’ll Learn

  • Models / UIs and local setup
  • Most common LLM Models
  • Privacy
  • RAG (Retrieval Augmented Generation)
  • Front Ends (Open WebUI, jan ai, lmstudio etc.)
  • Ollama
  • Huggingface
  • Prompting and Prompt Engineering
  • Zero-shot, few-shot, Chain of Thought
  • System Prompts
  • Make your own bots
  • Prompt leakage
  • Jailbreaking
  • Troubleshooting
  • API usage
  • Yolo tool
  • Fabric tool
  • LLM CLI
  • Using AI/LLM for Offensive Security
  • Using AI/LLM for Defensive Security


Reviews

  • D
    Dariusz Pawlikowski
    5.0

    The topics are prepared thoroughly and explained in a wonderfully accessible way. Besides that, Martin always offers help and answers questions. I recommend it!

  • V
    Vijay Kumar S
    5.0

    great

  • G
    Gabrielle Botbol
    5.0

    Martin is an amazing teacher. I have taken all his courses and I am not disappointed at all.

  • R
    Richard Hellstern
    5.0

    Just listened for 24 minutes. This seems to be an excellent class.

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed