Recommended Path: Topics
This article describes all our Topic Based Learning Paths.
Foundational: AI/LLM Security
Deep dive into AI/LLM security. Starting from foundational topics, working through the OWASP Top 10 threats, and touching on critical business considerations when working with Generative AI. (Video + Hands On)
Total Learning Path Duration: 4 hours and 24 minutes
Introduction to AI/LLM Security
Data Science Engineering for AI/LLM
AI/LLM | Training Data Poisoning (HackEDU)
AI/LLM | Supply Chain Vulnerabilities (HackEDU)
AI/LLM | Sensitive Information Disclosure (HackEDU)
AI/LLM | Model Denial of Service (HackEDU)
AI/LLM | Overreliance (HackEDU)
Application and Plugin Security for AI/LLM
AI/LLM | Prompt Injection (HackEDU)
AI/LLM | Insecure Output Handeling (HackEDU)
AI/LLM | Insecure Plugin Design (HackEDU)
AI/LLM | Excessive Agency (HackEDU)
Secure Development Leveraging LLMs
Foundational: OWASP API Top 10 (Topic)
Learn about the top ten threats to web API's. (Video + Hands On)
Total Learning Path Duration: 2 hours and 56 minutes
Broken Object Level Authorization (2023) (HackEDU)
Broken Authentication (HackEDU)
Broken Object Property Level Authorization (HackEDU)
Unrestricted Resource Consumption (HackEDU)
Broken Function Level Authorization (2023) (HackEDU)
Unrestricted Access to Sensitive Business Flows (HackEDU)
API Security Misconfiguration (HackEDU)
Improper Inventory Managment (HackEDU)
Unsafe Consumption of APIs (HackEDU)
Foundational: OWASP Top 10 for AI/LLM (Video Only)
Understand the Top ten threats to AI/LLM systems and the tools used to secure them. (Video Only)
Total Learning Path Duration: 1 hours and 54 minutes
Introduction to AI/LLM Security
Data Science Engineering for AI/LLM
Application and Plugin Security for AI/LLM
Secure Development Leveraging LLMs
Foundational: Software Supply Chain Security
This course provides an in-depth exploration of the tools, frameworks, and best practices essential for securing the software supply chain. (Video Only)
Total Learning Path Duration: 2 hours and 3 minutes
Introduction to Software Supply Chain Security
Secure Supply Chain Consumption Framework (S2C2F) | Part 1
Secure Supply Chain Consumption Framework (S2C2F) | Part 2
S2C2F: Implementation Guide | Part 1
S2C2F: Implementation Guide | Part 2
Software Component Verification Standard (SCVS) | Part 1
Software Component Verification Standard (SCVS) | Part 2
Software Component Verification Standard (SCVS) | Part 3
Software Bill of Materials (SBOM) | Part 1
Software Bill of Materials (SBOM) | Part 2