From the course: The AI-Driven Cybersecurity Analyst
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Prompt engineering and productivity tips for cybersecurity analysts
From the course: The AI-Driven Cybersecurity Analyst
Prompt engineering and productivity tips for cybersecurity analysts
- [Instructor] Prompt engineering. Doesn't it sound intimidating? I'm excited to demystify prompt engineering in this video, so let's jump right in. By the end, you'll be crafting prompts that make large language models or LLMs work for you, and that's not always easy. What is prompt engineering? At its core, prompt engineering is like learning to speak AI, not in a literal sense, but in learning how to communicate effectively with LLMs. A prompt is an input you give to an AI model to elicit a specific response. It can be a question, an instruction, data, or a combination of these. Before we dive into the details of prompt engineering, it's important to understand how LLMs work at a high level. LLMs excel at understanding token relationships, a token being a word or character, and predicting the next token in a sequence. Because these models are trained on vast amounts of text, documents, and web pages, they essentially become advanced word completers. For example, if you prompt a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Prompt engineering and productivity tips for cybersecurity analysts3m 4s
-
(Locked)
Advanced prompt engineering and productivity tips3m 53s
-
(Locked)
Using AI ethically and securely in cybersecurity, part 12m 50s
-
(Locked)
Using AI ethically and securely in cybersecurity, part 23m 4s
-
(Locked)
Running AI offline and locally3m 4s
-
(Locked)
Threat actors use of AI2m 8s
-
(Locked)
Threat detection with AI2m 46s
-
(Locked)
Improve security reporting using AI3m 42s
-
(Locked)
AI-driven threat intelligence2m 46s
-
(Locked)
LLM-driven honeypots2m 14s
-
(Locked)
-