Completed
intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
A Practical Guide to Securing Your AI Application
Automatically move to the next video in the Classroom when playback concludes
- 1 intro
- 2 preamble
- 3 the tipping point for generative ai
- 4 generative ai is powered by foundation models
- 5 security should run alongside generative ai
- 6 what is responsible ai?
- 7 generative ai security scoping matrix
- 8 generative ai project life cycle
- 9 data flows in generative ai application
- 10 owasp top 10 for llms
- 11 don't forget the fundamentals
- 12 what can you do?
- 13 controlling the vulnerabilities
- 14 prompt injection attacks
- 15 wrapper method - defining a ruleset
- 16 wrapper method - using delimiters
- 17 h3: helpful, honest, harmless
- 18 controlling vulnerabilities, toxicity moderator
- 19 limit pii for ai
- 20 multi-step self guarding
- 21 create guardrails for the e2e cycle
- 22 preload the least needed context
- 23 evaluation with genai
- 24 evaluate with benchmarks
- 25 reduve the affected resources
- 26 observability
- 27 generative ai on different layers
- 28 amazon bedrock
- 29 resources and call to action
- 30 thank you!