From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,800 courses taught by industry experts.

Module 8: Securing generative AI introduction

Module 8: Securing generative AI introduction

From the course: Certified Ethical Hacker (CEH)

Module 8: Securing generative AI introduction

- Everyone is using AI nowadays, so understanding and mitigating AI security risk has never been more critical than today. We'll begin with an introduction to the AI threats and the large language model security. We'll cover things like the OS top 10 for large language model applications and the MITRE ATLAS framework. You will learn about the coalition for secure AI and many best practices that are being developed by organizations like NIST and others. We will then cover prompt injection, insecure output handling, training data poisoning, model denial service, and supply chain security. We'll also cover other threats like sensitive information disclosure, insecure plugin design, and excessive agency. You will learn concepts that will help you understand over-reliance in AI model theft attacks, and understanding red teaming of AI models. We will go over retrieval augmented generation, the different permutations of retrieval augmented generation or RAG. You're going to explore tools…

Contents