Skip to content
  • There are no suggestions because the search field is empty.

Recommended Path: Topics

This article describes all our Topic Based Learning Paths.

Foundational: AI/LLM Security

Deep dive into AI/LLM security. Starting from foundational topics, working through the OWASP Top 10 threats, and touching on critical business considerations when working with Generative AI. (Video + Hands On)

Total Learning Path Duration: 4 hours and 24 minutes

Introduction to AI/LLM Security

Data Science Engineering for AI/LLM

AI/LLM | Training Data Poisoning (HackEDU)

AI/LLM | Supply Chain Vulnerabilities (HackEDU)

AI/LLM | Sensitive Information Disclosure (HackEDU)

Model Engineering for AI/LLM

AI/LLM | Model Denial of Service (HackEDU)

AI/LLM | Overreliance (HackEDU)

Model Theft

Application and Plugin Security for AI/LLM

AI/LLM | Prompt Injection (HackEDU)

AI/LLM | Insecure Output Handeling (HackEDU)

AI/LLM | Insecure Plugin Design (HackEDU)

AI/LLM | Excessive Agency (HackEDU)

AI/LLM Security Toolchain

Secure Development Leveraging LLMs

LLM Enterprise Security

Governance for AI/LLM Systems

Foundational: OWASP API Top 10 (Topic)

Learn about the top ten threats to web API's. (Video + Hands On)

Total Learning Path Duration: 2 hours and 56 minutes

OWASP API Top 10 | Part 1

Broken Object Level Authorization (2023) (HackEDU)

Broken Authentication (HackEDU)

Broken Object Property Level Authorization (HackEDU)

OWASP API Top 10 | Part 2

Unrestricted Resource Consumption (HackEDU)

Broken Function Level Authorization (2023) (HackEDU)

Unrestricted Access to Sensitive Business Flows (HackEDU)

OWASP API Top 10 | Part 3

Server-Side Request Forgery

API Security Misconfiguration (HackEDU)

Improper Inventory Managment (HackEDU)

Unsafe Consumption of APIs (HackEDU)

Foundational: OWASP Top 10 for AI/LLM (Video Only)

Understand the Top ten threats to AI/LLM systems and the tools used to secure them. (Video Only)

Total Learning Path Duration: 1 hours and 54 minutes

Introduction to AI/LLM Security

Data Science Engineering for AI/LLM

Model Engineering for AI/LLM

Application and Plugin Security for AI/LLM

AI/LLM Security Toolchain

Secure Development Leveraging LLMs

LLM Enterprise Security

Governance for AI/LLM Systems

Foundational: Software Supply Chain Security

This course provides an in-depth exploration of the tools, frameworks, and best practices essential for securing the software supply chain. (Video Only)

Total Learning Path Duration: 2 hours and 3 minutes

Introduction to Software Supply Chain Security

Secure Supply Chain Consumption Framework (S2C2F) | Part 1

Secure Supply Chain Consumption Framework (S2C2F) | Part 2

S2C2F: Implementation Guide | Part 1

S2C2F: Implementation Guide | Part 2

Software Component Verification Standard (SCVS) | Part 1

Software Component Verification Standard (SCVS) | Part 2

Software Component Verification Standard (SCVS) | Part 3

Software Bill of Materials (SBOM) | Part 1

Software Bill of Materials (SBOM) | Part 2