-
Artificial intelligence and large language models (LLMs) are revolutionizing our digital world - and at the same time opening up new areas of attack. In this intensive course, you will learn hands-on how modern AI systems can be attacked and secured. Using realistic examples, you will analyze vulnerabilities, carry out attacks yourself and learn how to develop robust countermeasures.
-
Course Contents
-
- OWASP Top 10 for LLMs and Gen AI
- Manipulation through language – Understanding, executing, and defending against prompt injection
- Exploiting insecure output – Recognizing dangerous trust in model responses
- Poisoning data at the source – Training data poisoning and its far-reaching consequences
- Disabling models – Practical application of denial-of-service attacks on LLMs
- Supply chains as a weak point – Supply chain attacks in the AI ecosystem
- Eliciting confidential data – Sensitive information disclosure through clever prompts
- Plugins as a gateway – Understanding and securing insecure plugin design
- When AI is allowed to do too much – Risks from excessive agency in autonomous systems
- Avoiding blind trust – Recognizing and reducing overreliance
-
Target Group
-
For developers, security researchers, Red Team members and anyone who wants to use LLMs securely or test them specifically. Basic knowledge of Python and AI is an advantage, but not essential. Equally welcome are all those who simply enjoy creatively tricking modern AI systems and exploring their limits in practice.
-
Knowledge Prerequisites
-
The prerequisites are curiosity, an interest in technology and no fear of shedding light on the darker side of AI. Basic knowledge of Python and AI is an advantage, but not essential.
You will acquire technical basics in the courses Large Language Models - ChatGPT, Gemini, Llama & Co. or ChatGPT - Programming & Problem Solving with AI Support.
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
Artificial intelligence and large language models (LLMs) are revolutionizing our digital world - and at the same time opening up new areas of attack. In this intensive course, you will learn hands-on how modern AI systems can be attacked and secured. Using realistic examples, you will analyze vulnerabilities, carry out attacks yourself and learn how to develop robust countermeasures.
-
Course Contents
-
- OWASP Top 10 for LLMs and Gen AI
- Manipulation through language – Understanding, executing, and defending against prompt injection
- Exploiting insecure output – Recognizing dangerous trust in model responses
- Poisoning data at the source – Training data poisoning and its far-reaching consequences
- Disabling models – Practical application of denial-of-service attacks on LLMs
- Supply chains as a weak point – Supply chain attacks in the AI ecosystem
- Eliciting confidential data – Sensitive information disclosure through clever prompts
- Plugins as a gateway – Understanding and securing insecure plugin design
- When AI is allowed to do too much – Risks from excessive agency in autonomous systems
- Avoiding blind trust – Recognizing and reducing overreliance
-
Target Group
-
For developers, security researchers, Red Team members and anyone who wants to use LLMs securely or test them specifically. Basic knowledge of Python and AI is an advantage, but not essential. Equally welcome are all those who simply enjoy creatively tricking modern AI systems and exploring their limits in practice.
-
Knowledge Prerequisites
-
The prerequisites are curiosity, an interest in technology and no fear of shedding light on the darker side of AI. Basic knowledge of Python and AI is an advantage, but not essential.
You will acquire technical basics in the courses Large Language Models - ChatGPT, Gemini, Llama & Co. or ChatGPT - Programming & Problem Solving with AI Support.
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
