This video is still being processed. Please check back later and refresh the page.

Uh oh! Something went wrong, please try again.

Managing AI Security Risks

Learn the most common vulnerabilities and points of attack in AI and LLMs, along with general best practices for cybersecurity. Get tips to prevent hacking and security breaches.

rate limit

Code not recognized.

About this course

If you’re considering implementing AI into your workflow, it’s important to consider security measures first. This course explains the most common vulnerabilities and points of attack, along with general best practices for cybersecurity. Then, we’ll explain some routine attacks and vulnerabilities that happen most often in the development phase, and outline steps to help prevent these from happening to you. Lastly, we discuss some of the vulnerabilities and attacks that happen in production - within admin and ops, and attacks via LLMs - then cite ways to fend off those attacks.

What's covered

Attacks via engineering
  • Where attacks happen
  • Prompt injections
  • Data poisoning
  • Supply chain issues
  • Data leaks
  • Input manipulation
Attacks through ops and admin
  • Denial of Service (DoS)
  • Permission issues
  • Excessive autonomy
  • Overreliance
  • Plugins not secure
  • Attacks through production LLM use

Curriculum28 min

  • Preview
    Course Overview
  • Attacks via engineering 16 min
  • Attacks through ops and admin 12 min
  • Quiz
  • Related Content
  • Blogs, articles, developer stuff
  • Get more AI training 1 min

About this course

If you’re considering implementing AI into your workflow, it’s important to consider security measures first. This course explains the most common vulnerabilities and points of attack, along with general best practices for cybersecurity. Then, we’ll explain some routine attacks and vulnerabilities that happen most often in the development phase, and outline steps to help prevent these from happening to you. Lastly, we discuss some of the vulnerabilities and attacks that happen in production - within admin and ops, and attacks via LLMs - then cite ways to fend off those attacks.

What's covered

Attacks via engineering
  • Where attacks happen
  • Prompt injections
  • Data poisoning
  • Supply chain issues
  • Data leaks
  • Input manipulation
Attacks through ops and admin
  • Denial of Service (DoS)
  • Permission issues
  • Excessive autonomy
  • Overreliance
  • Plugins not secure
  • Attacks through production LLM use

Curriculum28 min

  • Preview
    Course Overview
  • Attacks via engineering 16 min
  • Attacks through ops and admin 12 min
  • Quiz
  • Related Content
  • Blogs, articles, developer stuff
  • Get more AI training 1 min

For more information on how HPE manages, uses and protects your information please refer to HPE Privacy Statement. You can always withdraw or modify your consent to receive marketing communication from HPE. This can be done by using the opt-out and preference mechanism at the bottom of our email marketing communication or by following this link.

×