Category AI/ML
LEARNING PATH~2hrs 30mins
OWASP Top 10 LLM and GenAI
By completing these LLM/GenAI modules, you will have taken steps toward creating more secure AI applications!
0% Completed
LESSON~15mins
System prompt leakage in LLMs
Learn how users can manipulate a chatbot into revealing its system instructions, why that’s dangerous, and how to prevent this kind of leakage.
0% Completed
LESSON~15mins
Model theft
Learn about model theft (LLM10) in the OWASP Top 10 for LLM applications. We'll look at what it is and how to mitigate it.
0% Completed
LESSON~15mins
Supply chain vulnerabilities
Learn how your LLM can become vulnerable due to threats within the supply chain. We'll look at examples and mitigation techniques.
0% Completed
LESSON~15mins
Training data poisoning
Learn how your LLM can become insecure and unreliable with training data poisoning. We'll look at examples and mitigation techniques.
0% Completed
LESSON~15mins
Sensitive information disclosure in LLMs
Learn how your LLM might give away too much data, including sensitive information. We'll look at examples and mitigation techniques.
0% Completed