Video description
Learn practical applications with ChatGPT, Claude, Copilot, LangChain, LlamaIndex, and AI models.
Overview
2.5 hours of video training
- Learn to use AI for cybersecurity, networking, and programming tasks.
- Use examples of practical, hands-on activities and demos that emphasize real-world tasks.
- Implement AI tools as a programmer, developer, networking, or security professional.
AI-Enabled Programming, Networking, and Cybersecurity is for programmers, developers, networking, or security professionals looking to use AI tools. AI-powered tools like ChatGPT, GitHub Copilot, Cursor, LangChain, and other AI models are changing the landscape of cybersecurity, programming, networking, and beyond. This course covers the introduction to the AI models, focusing on ChatGPT for cybersecurity education, GitHub Copilot and Cursor for programming support, and other AI models that have proven useful for learning and work enhancements, and explores the practical applications of these tools, emphasizing how to ask effective questions, interpret answers, and engage in deeper learning.
Related learning
- Sign up for AI-Enabled Programming, Networking, and Cybersecurity training by Omar Santos
- Sign up for live training classes by Omar Santos
About the Instructor
Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar is the co-chair of the Coalition for Secure AI (CoSAI). Omar’s collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). He is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of more than 20 books, numerous video courses, and more than 50 academic research papers and is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs.
Skill Level
Intermediate
Course Requirement
This course requires only a Linux, macOS, or Windows computer equipped with a web browser and Internet access. All code is shared via different GitHub repositories. For learners interested in applying their cybersecurity knowledge in a hands-on manner, we recommend setting up WebSploit Labs by following the instructions provided at https://websploit.org.
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Table of contents
- Introduction
-
Lesson 1: Introduction to AI-powered Tools
- Learning objectives
- 1.1 Overview of the Evolution of AI-driven Tools
- 1.2 Large Language Models (LLMs) and Small Language Models (SLMs)
- 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks
- 1.4 An Overview of Open-source AI Models and Hugging Face
- 1.5 Introducing Retrieval Augmented Generation (RAG)
- 1.6 Introducing Embedding Models
- 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others
- 1.8 Introducing Semantic Search
- Lesson 2: Using AI for Cybersecurity
- Lesson 3: Using AI for Software Development
- Lesson 4: Using AI for Networking
- Lesson 5: Future Trends and Additional Emerging Technologies
- Summary
Product information
- Title: AI-Enabled Programming, Networking, and Cybersecurity
- Author(s):
- Release date: October 2024
- Publisher(s): Pearson
- ISBN: 0135402697
You might also like
article
From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI
Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. …
article
Use Github Copilot for Prompt Engineering
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …
article
Run Llama-2 Models Locally with llama.cpp
Llama is Meta’s answer to the growing demand for LLMs. Unlike its well-known technological relative, ChatGPT, …
article
Twenty Years of Open Innovation
Organizations that practice open innovation draw on external resources to develop new ideas for products and …