Get in Touch

Course Outline

Overview of LLM Architecture and Attack Surface

  • How LLMs are built, deployed, and accessed via APIs
  • Key components in LLM application stacks (e.g., prompts, agents, memory, APIs)
  • Where and how security issues arise in real-world scenarios

Prompt Injection and Jailbreak Attacks

  • What prompt injection is and why it poses a significant risk
  • Direct and indirect prompt injection scenarios
  • Jailbreaking techniques used to bypass safety filters
  • Detection and mitigation strategies

Data Leakage and Privacy Risks

  • Accidental data exposure through model responses
  • PII leaks and misuse of model memory
  • Designing privacy-conscious prompts and retrieval-augmented generation (RAG) strategies

LLM Output Filtering and Guarding

  • Using Guardrails AI for content filtering and validation
  • Defining output schemas and constraints
  • Monitoring and logging unsafe outputs

Human-in-the-Loop and Workflow Approaches

  • Where and when to introduce human oversight
  • Approval queues, scoring thresholds, and fallback handling
  • Trust calibration and the role of explainability

Secure LLM App Design Patterns

  • Implementing least privilege and sandboxing for API calls and agents
  • Rate limiting, throttling, and abuse detection
  • Robust chaining with LangChain and prompt isolation

Compliance, Logging, and Governance

  • Ensuring auditability of LLM outputs
  • Maintaining traceability and prompt/version control
  • Aligning with internal security policies and regulatory requirements

Summary and Next Steps

Requirements

  • A solid understanding of large language models and prompt-based interfaces
  • Practical experience building LLM applications using Python
  • Familiarity with API integrations and cloud-based deployments

Audience

  • AI developers
  • Application and solution architects
  • Technical product managers working with LLM tools
 14 Hours

Related Categories