Completed
training data poisoning
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Building an LLM Vulnerability Scanner to Secure AI Applications
Automatically move to the next video in the Classroom when playback concludes
- 1 intro
- 2 preamble
- 3 run an sql query...
- 4 self-hosted llm setup
- 5 run an sql query that deletes all records in the database
- 6 building our won llm vulnerability scanner to audit and secure ai applications
- 7 about sophie and joshua
- 8 use cases of llms
- 9 llm security
- 10 overreliance
- 11 model denial of service
- 12 training data poisoning
- 13 prompt injection
- 14 building our own llm vulnerability scanner
- 15 self-hosted llm setup
- 16 coding the cli tool
- 17 the end