Demystifying LLMs and Their Security Implications - A Business-Friendly Overview

Demystifying LLMs and Their Security Implications - A Business-Friendly Overview

Cloud Security Alliance via YouTube Direct link

You Can Hijack Trusted Content

28 of 31

28 of 31

You Can Hijack Trusted Content

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Demystifying LLMs and Their Security Implications - A Business-Friendly Overview

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 How I learn
  3. 3 Example
  4. 4 LLM Basics
  5. 5 Tokenization
  6. 6 Embedding
  7. 7 Attention
  8. 8 Generation Phase
  9. 9 Patterns
  10. 10 LLM Architecture
  11. 11 LLM Types
  12. 12 LLM Threats
  13. 13 Prompt Injection
  14. 14 Control vs Data Plane
  15. 15 Cross Site Scripting
  16. 16 Control Plane vs LLM
  17. 17 Real Life Example
  18. 18 AI Assistant Example
  19. 19 AI Tokens
  20. 20 LLM Firewall
  21. 21 Dual LLMs
  22. 22 Chat LLMs
  23. 23 Prompt Vulnerability Dollars
  24. 24 Risk of Prompt Injection
  25. 25 Data Poisoning
  26. 26 Goal
  27. 27 Obtaining Trusted Data Sources
  28. 28 You Can Hijack Trusted Content
  29. 29 Data Poisoning Example
  30. 30 Data Poisoning Solutions
  31. 31 Data Leakage

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.