وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Introduction to LLM Vulnerabilities

سرفصل های دوره

As large language models (LLMs) revolutionize the AI landscape, it’s becoming crucial to understand and address the unique security challenges they present. In this comprehensive course from Pragmatic AI Labs, instructor Alfredo Deza covers the technical knowledge and skills required to identify, mitigate, and prevent security vulnerabilities in your LLM applications. Explore common security threats, such as model theft, prompt injection, and sensitive information disclosure, and learn practical techniques to prevent attackers from exploiting vulnerabilities and compromising your systems. Discover best practices for secure plug-in design, input validation, and sanitization, as well as how to actively monitor dependencies for security updates and vulnerabilities. Along the way, Alfredo outlines strategies for protecting AI systems against unauthorized access and data breaches. By the end of the course, you’ll be prepared to deploy robust, secure, and effective AI solutions.

Note: This course was created by Pragmatic AI Labs. We are pleased to host this training in our library.


01 - About This Course
  • 01 - Meet your instructor

  • 02 - 1. Foundations of Large Language Models
  • 01 - How do LLMs work in applications
  • 02 - How are LLMs created
  • 03 - What are LLMs and how do they work

  • 03 - 2. Language Model Applications
  • 01 - Introduction to language model applications
  • 02 - Common types of generative AI applications
  • 03 - Overview of an API-based application
  • 04 - Overview of an embedded-model application
  • 05 - What is a multi-modal application
  • 06 - Challenges and highlights of AI applications
  • 07 - Summary

  • 04 - 3. Model Vulnerabilities
  • 01 - Introduction to model-based vulnerabilities
  • 02 - Prompt injection
  • 03 - Insecure output handling
  • 04 - Model theft
  • 05 - Model replication
  • 06 - Summary

  • 05 - 4. System Vulnerabilties
  • 01 - Introduction to system vulnerabilities
  • 02 - Application vulnerabilities
  • 03 - Sensitive information disclosure
  • 04 - Insecure plugin design
  • 05 - Summary

  • 06 - Conclusion
  • 01 - Conclusion
  • 02 - Other types of vulnerabilities
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 42863
    حجم: 233 مگابایت
    مدت زمان: 86 دقیقه
    تاریخ انتشار: ۲۹ دی ۱۴۰۳
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید