Companies Home Search Profile

Securing GenAI Systems: The OWASP LLM Top Ten

Focused View

Pack Of Coders - POC

1:40:53

0 View
  • 1. Introduction.mp4
    01:42
  • 2. Course Structure.mp4
    01:40
  • 3. Resources.mp4
    01:11
  • 4. Ethics.mp4
    00:55
  • 1. AI Foundations.mp4
    06:59
  • 2. The OWASP LLM Top Ten.mp4
    07:36
  • 3. Common Themes Across the Top Ten.mp4
    05:00
  • 1.1 Notes - Prompt Injection.pdf
  • 1. OWASP LLM #1 Prompt Injection.mp4
    02:26
  • 2. Understanding the Vulnerability.mp4
    02:27
  • 3. Threat and Defense.mp4
    02:52
  • 4. Quiz - Prompt Injection.html
  • 1.1 Notes - Insecure Output Handling.pdf
  • 1. OWASP LLM #2 Insecure Output Handling.mp4
    02:28
  • 2. Understanding the Vulnerability.mp4
    01:44
  • 3. Threat and Defense.mp4
    02:42
  • 4. Quiz - Insecure Output Handling.html
  • 1.1 Notes - Poisoned Training Data.pdf
  • 1. OWASP LLM #3 Training Data Poisoning.mp4
    01:16
  • 2. Understanding the Vulnerability.mp4
    01:57
  • 3. Threat and Defense.mp4
    03:41
  • 4. Quiz - Training Data Poisoning.html
  • 1.1 Notes - Model Denial of Service.pdf
  • 1. OWASP LLM #4 Model Denial of Service.mp4
    01:48
  • 2. Understanding the Vulnerability.mp4
    02:01
  • 3. Threat and Defense.mp4
    02:56
  • 4. Quiz - Model Denial of Service.html
  • 1.1 Notes - Supply Chain Vulnerabilities.pdf
  • 1. OWASP LLM #5 Supply Chain Vulnerabilities.mp4
    00:51
  • 2. Understanding the Vulnerability.mp4
    02:17
  • 3. Threat and Defense.mp4
    04:43
  • 4. Quiz - Supply Chain Vulnerabilities.html
  • 1.1 Notes - Sensitive Information Disclosure.pdf
  • 1. OWASP LLM #6 Sensitive Information Disclosure.mp4
    02:01
  • 2. Understanding the Vulnerability.mp4
    02:09
  • 3. Threat and Defense.mp4
    02:58
  • 4. Quiz - Sensitive Information Disclosure.html
  • 1.1 Notes - Insecure Plugin Design.pdf
  • 1. OWASP LLM #7 Insecure Plugin Design.mp4
    01:49
  • 2. Understanding the Vulnerability.mp4
    02:19
  • 3. Threat and Defense.mp4
    03:57
  • 4. Quiz - Insecure Plugin Design.html
  • 1.1 Notes - Excessive Agency.pdf
  • 1. OWASP LLM #8 Excessive Agency.mp4
    01:29
  • 2. Understanding the Vulnerability.mp4
    02:45
  • 3. Threat and Defense.mp4
    04:00
  • 4. Quiz - Excessive Agency.html
  • 1.1 Notes - Overreliance.pdf
  • 1. OWASP LLM #9 Overreliance.mp4
    01:24
  • 2. Understanding the Vulnerability.mp4
    01:41
  • 3. Threat and Defense.mp4
    03:46
  • 4. Quiz - Overreliance.html
  • 1.1 Notes - Model Theft.pdf
  • 1. OWASP LLM #10 Model Theft.mp4
    01:18
  • 2. Understanding the Vulnerability.mp4
    03:25
  • 3. Threat and Defense.mp4
    02:34
  • 4. Quiz - Model Theft.html
  • 1. Summary and Thank You.mp4
    02:06
  • Description


    If your company needs security awareness training for AI - then look no further!

    What You'll Learn?


    • Improve your security awareness of AI systems and the vulnerabilities that can impact them
    • Students will learn about some of the most common vulnerabilities that are found in AI systems
    • Learn where to spot these vulnerabilities in your AI ecosystem
    • Understand the threats these vulnerabilities pose to your applications and users
    • Discover steps to take that can mitigate the impact of these vulnerabilities and help your AI software operate in a safe manner
    • Learn about common these seen across vulnerabilities and AI security practices

    Who is this for?


  • Anyone interesting in learning about securing GenAI systems
  • Development Teams that need security aware training for AI
  • Security Engineers
  • Security Architects
  • What You Need to Know?


  • An understanding of basic computing and software concepts is helpful
  • More details


    Description

    In the rapidly evolving landscape of Artificial Intelligence (AI) and Machine Learning (ML), ensuring the security of these systems is paramount. This course delves into the intersection of AI and cybersecurity, focusing on the OWASP LLM (Large Language Model) Top Ten vulnerabilities as a way to drive the conversation.


    If your company needs security awareness for your AI and development teams...then you'll see the value in this course!


    The course begins with an exploration of the fundamental concepts of AI and ML, providing participants with a solid understanding of how these technologies work and their significance in various domains. From there, the focus shifts to the security aspect, introducing the OWASP Top Ten vulnerabilities specific to AI and ML systems.


    Throughout the course, participants will:

    • Explore OWASP LLM Top Ten: Gain insights into the most prevalent security risks and misconfigurations affecting AI and ML systems, as identified by OWASP.


    • Understand Threat Scenarios: Delve into real-world scenarios where AI and ML systems are vulnerable to exploitation, understanding the potential impact of security breaches on organizations and society.


    • Learn Mitigation Techniques: Acquire knowledge on mitigating OWASP LLM Top Ten vulnerabilities through a combination of best practices, security tools, and robust development methodologies.


    Who Should Attend:

    This course is designed for AI/ML practitioners, cybersecurity professionals, software developers, system architects, and anyone involved in the development, deployment, or management of AI and ML systems. It is suitable for individuals seeking to enhance their understanding of AI/ML security and mitigate risks within their organizations.


    Prerequisites:

    Familiarity with basic concepts of AI/ML and cybersecurity is recommended but not required. Participants should have a keen interest in understanding and improving the security posture of AI and ML systems.


    The course is structured as a self-paced online learning experience, allowing participants to progress through the material at their own convenience.


    Enroll today to embark on a journey towards understanding key aspects of securing GenAI against common vulnerabilities, safeguarding the future of AI applications.

    Who this course is for:

    • Anyone interesting in learning about securing GenAI systems
    • Development Teams that need security aware training for AI
    • Security Engineers
    • Security Architects

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pack Of Coders - POC
    Pack Of Coders - POC
    Instructor's Courses
    Pack Of Coders provides online technology training, publishing, and consulting services.  Training is targeted at various skill levels and seeks to provide students with a better understanding of technology, software development practices, and cybersecurity topics.  Major course offerings include:Targeted training through our Rapid Skill Boost series - designed to help you hit the ground running on a new technology. Our Essential Skills series of courses quickly gets you trained on foundational  elements of a technology or tool.If you're working towards certifications, then our Exam Coaching sessions are just what you need.  These courses help you navigate the questions you might face on exam day!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 38
    • duration 1:40:53
    • Release Date 2024/09/18