Category AI/ML
LEARNING PATH~2hrs 30mins
OWASP Top 10 LLM and GenAI
By completing these LLM/GenAI modules, you will have taken steps toward creating more secure AI applications!
0% Completed
LESSON~15mins
Model theft
Learn about model theft (LLM10) in the OWASP Top 10 for LLM applications. We'll look at what it is and how to mitigate it.
0% Completed
LESSON~15mins
Supply chain vulnerabilities
Learn how your LLM can become vulnerable due to threats within the supply chain. We'll look at examples and mitigation techniques.
0% Completed
LESSON~15mins
Training data poisoning
Learn how your LLM can become insecure and unreliable with training data poisoning. We'll look at examples and mitigation techniques.
0% Completed
LESSON~15mins
Sensitive information disclosure in LLMs
Learn how your LLM might give away too much data, including sensitive information. We'll look at examples and mitigation techniques.
0% Completed
LESSON~15mins
Insecure output handling in LLMs
Learn how your LLM can create vulnerabilities by not sanitizing data and creating insecure output. We'll look at examples and mitigation techniques.
0% Completed