Building an LLM Vulnerability Scanner to Secure AI Applications

Building an LLM Vulnerability Scanner to Secure AI Applications

Conf42 via YouTube Direct link

preamble

2 of 17

2 of 17

preamble

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Building an LLM Vulnerability Scanner to Secure AI Applications

Automatically move to the next video in the Classroom when playback concludes

  1. 1 intro
  2. 2 preamble
  3. 3 run an sql query...
  4. 4 self-hosted llm setup
  5. 5 run an sql query that deletes all records in the database
  6. 6 building our won llm vulnerability scanner to audit and secure ai applications
  7. 7 about sophie and joshua
  8. 8 use cases of llms
  9. 9 llm security
  10. 10 overreliance
  11. 11 model denial of service
  12. 12 training data poisoning
  13. 13 prompt injection
  14. 14 building our own llm vulnerability scanner
  15. 15 self-hosted llm setup
  16. 16 coding the cli tool
  17. 17 the end

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.