defense-implementation
Implement mitigations, create input filters, design output guards, and build defensive prompting for LLM security
red-team-frameworks
Tools and frameworks for AI red teaming including PyRIT, garak, Counterfit, and custom attack automation
security-testing
Comprehensive security testing automation for AI/ML systems with CI/CD integration
testing-methodologies
Structured approaches for AI security testing including threat modeling, penetration testing, and red team operations
model-extraction
Techniques to extract model weights, architecture, and training data through API queries
red-team-reporting
Professional security report generation, executive summaries, finding documentation, and remediation tracking
infrastructure-security
Securing AI/ML infrastructure including model storage, API endpoints, and compute resources
rag-exploitation
Attack techniques for Retrieval-Augmented Generation systems including knowledge base poisoning
prompt-injection-testing
Master prompt injection attacks, jailbreak techniques, input manipulation, and payload crafting for LLM security testing
responsible-disclosure
Ethical vulnerability reporting, coordinated disclosure, and bug bounty participation for AI systems
secure-deployment
Security best practices for deploying AI/ML models to production environments
code-injection
Test AI systems for code injection vulnerabilities including prompt-to-code attacks and agent exploitation
model-inversion
Privacy attacks to extract training data and sensitive information from AI models
vulnerability-discovery
Systematic vulnerability finding, threat modeling, and attack surface analysis for AI/LLM security assessments
adversarial-training
Defensive techniques using adversarial examples to improve model robustness and security
security
Secure backend applications against OWASP threats. Implement authentication, encryption, scanning, compliance, and incident response procedures.
security
JavaScript security best practices and vulnerability prevention.
security
Master Kubernetes security, RBAC, network policies, pod security, and compliance. Learn to secure clusters and enforce access control.
Page 6 of 15 · 260 results