This module will cover the OWASP Top 10 for LLM Applications and Services, to analyse the robustness of a service or an application that is using LLMs. Students will learn about Prompt Injection, Hallucinations, Data Leaks, Client-Side Attacks using LLMs, how to attack a company using insecure plugins or jailbreaking techniques.
This module will analyse the RAG architecture for GenAI Digital Services to understand the concept of Augmented Prompting, Grounding or how to hack and protect LLMs using LLMs. It will also cover topics related to LLM firewalling and content security.
In the end, students will learn about the risks in self-created LLMs in enterprises, through Fine-Tuning, and the risks related to them.