Completed
Real Life Example
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Demystifying LLMs and Their Security Implications - A Business-Friendly Overview
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 How I learn
- 3 Example
- 4 LLM Basics
- 5 Tokenization
- 6 Embedding
- 7 Attention
- 8 Generation Phase
- 9 Patterns
- 10 LLM Architecture
- 11 LLM Types
- 12 LLM Threats
- 13 Prompt Injection
- 14 Control vs Data Plane
- 15 Cross Site Scripting
- 16 Control Plane vs LLM
- 17 Real Life Example
- 18 AI Assistant Example
- 19 AI Tokens
- 20 LLM Firewall
- 21 Dual LLMs
- 22 Chat LLMs
- 23 Prompt Vulnerability Dollars
- 24 Risk of Prompt Injection
- 25 Data Poisoning
- 26 Goal
- 27 Obtaining Trusted Data Sources
- 28 You Can Hijack Trusted Content
- 29 Data Poisoning Example
- 30 Data Poisoning Solutions
- 31 Data Leakage