FileMood

Download [ WebToolTip.com ] Udemy - OWASP Top 10 for LLM Applications (2025)

WebToolTip com Udemy OWASP Top 10 for LLM Applications 2025

Name

[ WebToolTip.com ] Udemy - OWASP Top 10 for LLM Applications (2025)

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

4.1 GB

Total Files

74

Last Seen

2025-07-18 00:26

Hash

0E2E227CB7A85D7161442CB9AE42F65B582A735C

/

Get Bonus Downloads Here.url

0.2 KB

/.../1 - Module 1 Introduction to LLM Application Security/

1 -Introduction to LLMs and their applications.mp4

55.6 MB

2 -Overview of security challenges specific to LLM applications.mp4

29.6 MB

3 -Introduction to the OWASP Top 10 LLM Applications list.mp4

41.7 MB

4 -Importance of secure LLM development and deployment.mp4

48.1 MB

5 -Real-world case studies of successfulunsuccessful LLM implementations.mp4

72.3 MB

6 -Common LLM application architectures (e.g., RAG).mp4

72.5 MB

7 -The threat landscape motivations of attackers targeting LLM applications.mp4

60.9 MB

/.../10 - Module 10 LLM092025 – Misinformation/

1 -The issue of misinformation generated by LLMs.mp4

82.6 MB

2 -Causes and potential impacts of misinformation.mp4

101.1 MB

3 -Prevention and mitigation strategies.mp4

69.9 MB

4 -The spectrum of misinformation.mp4

86.0 MB

5 -Impact on specific domains.mp4

104.2 MB

6 -Detection and mitigation techniques.mp4

118.1 MB

/.../11 - Module 11 LLM102025 – Unbounded Consumption/

1 -Risks associated with excessive and uncontrolled LLM usage.mp4

57.9 MB

2 -Vulnerabilities that can lead to denial of service, economic losses, etc.mp4

63.4 MB

3 -Prevention and mitigation strategies.mp4

55.7 MB

4 -Economic denial of service.mp4

44.5 MB

5 -Rate limiting strategies.mp4

46.2 MB

6 -Model extraction defenses.mp4

54.6 MB

/.../12 - Module 12 Best Practices and Future Trends in LLM Security/

1 -Summary of key security principles for LLM applications.mp4

39.0 MB

2 -Emerging trends and future challenges in LLM security.mp4

50.9 MB

3 -Resources and further learning.mp4

39.9 MB

4 -Secure LLM development lifecycle integrating security into every stage.mp4

48.1 MB

5 -Emerging technologies.mp4

59.9 MB

6 -The role of standards and regulations.mp4

52.2 MB

/.../2 - Module 2 LLM012025 – Prompt Injection/

1 -Detailed explanation of prompt injection vulnerabilities.mp4

44.3 MB

2 -Types of prompt injection (direct and indirect).mp4

55.0 MB

3 -Potential impacts of prompt injection attacks.mp4

63.1 MB

4 -Prevention and mitigation strategies.mp4

62.1 MB

5 -Evolution of prompt injection techniques and their increasing sophistication.mp4

56.0 MB

6 -Impact deep dive specific examples.mp4

68.1 MB

7 -Defense-in-depth combining input validation, output filtering, and human review.mp4

61.1 MB

/.../3 - Module 3 LLM022025 – Sensitive Information Disclosure/

1 -Common examples of vulnerabilities(PII leakage, proprietary algorithm exposure.).mp4

82.5 MB

2 -Understanding the risks of sensitive information disclosure in LLM applications.mp4

107.2 MB

3 -Prevention and mitigation strategies (sanitization, access controls, etc.).mp4

63.5 MB

4 -Data minimization importance of minimizing sensitive data collection.mp4

47.0 MB

5 -Privacy-enhancing technologies - PET.mp4

61.6 MB

6 -Legal and compliance legal implications of sensitive data disclosure.mp4

72.1 MB

/.../4 - Module 4 LLM032025 – Supply Chain/

1 -Supply chain vulnerabilities in LLM development and deployment.mp4

114.3 MB

2 -Prevention and mitigation strategies for supply chain risks.mp4

52.9 MB

3 -SBOMs in detail explanation of Software Bill of Materials (SBOMs) and their imp.mp4

54.8 MB

4 -Model provenance challenges difficulties in verifying the origin and integrity.mp4

48.3 MB

5 -Governance and policy importance of clear policies for using third-party LLMs.mp4

49.0 MB

/.../5 - Module 5 LLM042025 – Data and Model Poisoning/

1 -Understanding data and model poisoning attacks.mp4

30.6 MB

2 -How poisoning can impact LLM behavior and security.mp4

46.9 MB

3 -Prevention and mitigation strategies.mp4

51.6 MB

4 -Poisoning scenarios across the lifecycle poisoning in training and fine-tuning.mp4

49.9 MB

5 -Backdoor attacks detail on how backdoors are inserted.mp4

42.6 MB

6 -Robustness testing need for rigorous testing to detect poisoning effects.mp4

47.3 MB

/.../6 - Module 6 LLM052025 – Improper Output Handling/

1 -Risks associated with improper handling of LLM outputs.mp4

51.6 MB

2 -Vulnerabilities such as XSS, SQL injection, and remote code execution.mp4

43.7 MB

3 -Prevention and mitigation strategies.mp4

48.3 MB

4 -Output encoding examples code examples for different contexts (e.g., HTML, SQL).mp4

43.6 MB

5 -Real-world exploits detail cases where improper output handling led to breaches.mp4

55.8 MB

/.../7 - Module 7 LLM062025 – Excessive Agency/

1 -The concept of agency in LLM systems and associated risks.mp4

60.1 MB

2 -Risks of excessive functionality, permissions, and autonomy.mp4

55.2 MB

3 -Prevention and mitigation strategies.mp4

47.7 MB

4 -Agentic systems explanation of LLM agents, their benefits, and risks.mp4

43.5 MB

5 -Least privilege in depth detailed guidance on implementing least privilege.mp4

67.1 MB

6 -Authorization frameworks best practices for managing authorization in LLM.mp4

46.8 MB

/.../8 - Module 8 LLM072025 – System Prompt Leakage/

1 -Vulnerability of system prompt leakage.mp4

36.0 MB

2 -Risks associated with exposing system prompts.mp4

38.4 MB

3 -Prevention and mitigation strategies.mp4

45.6 MB

4 -Prompt engineering risks how prompt engineering can extract system prompts.mp4

42.8 MB

5 -Defense in depth for prompts.mp4

57.2 MB

6 -Secure design principles.mp4

54.9 MB

/.../9 - Module 9 LLM082025 – Vector and Embedding Weaknesses/

1 -Vulnerabilities related to vector and embedding usage in LLM applications.mp4

46.1 MB

2 -Risks of unauthorized access, data leakage, and poisoning.mp4

55.9 MB

3 -Prevention and mitigation strategies.mp4

50.0 MB

4 -Embedding security details on securing vector databases and embeddings.mp4

50.7 MB

5 -RAG security best practices.mp4

60.8 MB

6 -Emerging research.mp4

60.7 MB

/~Get Your Files Here !/

Bonus Resources.txt

0.1 KB

 

Total files 74


Copyright © 2025 FileMood.com