Category AI/ML
LEARNING PATH~2hrs 30mins
OWASP Top 10 LLM and GenAI
By completing these LLM/GenAI modules, you will have taken steps toward creating more secure AI applications!
0% Completed
LEARNING PATH~2hrs 30mins
OWASP Top 10 LLM and GenAI 2024
By completing these LLM/GenAI modules, you will have taken steps toward creating more secure AI applications!
0% Completed
LESSON~15mins
Misinformation in LLMs
Learn how LLMs can spread convincing misinformation and explore techniques to prevent harmful or false outputs.
0% Completed
LESSON~15mins
Unbounded Consumption in LLMs
Learn how attackers can exploit recursive LLM processes to cause denial of service and rack up huge bills.
0% Completed
LESSON~15mins
Vector and embedding weaknesses in LLMs
Learn how weak embeddings in LLMs can confuse inputs, enabling attackers to bypass filters or poison models.
0% Completed
LESSON~15mins
System prompt leakage in LLMs
Learn how users can manipulate a chatbot into revealing its system instructions, why that’s dangerous, and how to prevent this kind of leakage.
0% Completed