
Welcome to introduction to exploiting AI with Ben Bowman. In this workshop, we’ll discuss the MITRE attack framework and inherent flaws with AI and security, attack vectors, and how to make sure you know how not to deploy or handle an AI.
Live Training $25 - $150
Course Length: 4 Hours
Next scheduled date: September 12th, 2025 @ 11:00 AM EDT
Description
Welcome to introduction to exploiting AI with Ben Bowman. In this workshop, we’ll discuss the MITRE attack framework and inherent flaws with AI and security, attack vectors, and how to make sure you know how not to deploy or handle an AI.
This class will mostly be the offensive side of things with students getting to practice offensive techniques in a controlled environment as well as learning about tooling that exists to attack AI models. This should help students understand the risks of AI but will not teach any hands on defensive remediations, only discussion of how to potentially harden and remediate security issues.
System Requirements
-
Hardware Requirements
- Ryzen 5 or i5 CPU with 16 GB of RAM
-
Software Requirements
- Hypervisor(VMWare/Virtual Box) and Hugging Face.
-
VM/Lab/Student information
- VMs will be provided to the students.
Syllabus
The Basics
-
- What is AI and LLM
-
- Deep Dive
-
- What Attack Surfaces exist
Attack Vectors
-
- Prompt Injection
-
- Filter Dumping
-
- Containment Breach
-
- Data Poisoning
-
- Training a spam classifier
-
- Training a network traffic classification system
-
- Model Inversion Attacks
-
- Inferring Information Using a Loan Assessment AI
-
- Transfer Model Attack
Preventitive Measures
-
- Preventing Prompt Injection
-
- Preventing Data Poisoning
-
- Preventing Model Inversion Attacks
-
- Preventing Transfer Model Attacks
Understanding the real world
-
- Entering an Uncontrolled Environment
Tooling
-
- PyRit
-
- Garak
-
- Playgrounds
FAQ
About the Instructor

Benjamin Bowman
"Hacker | Researcher | Speaker | Bird Enthusiast"Bio
Ben Bowman joined the cyber security world at 12 years old. Slowly migrating from the wrong side of the field to the right side, perusing a bachelor’s in cyber operations and catching the attention of Black Hills Info Sec after appearing on NPR for hacking AI at Defcon. Follow me on GitHub: https://github.com/her3ticAVI
Register for Upcoming
-
Filter by Product Date
-
Filter by Product Instructor
-
Filter by Product Type
Workshop: Exploiting AI with Ben Bowman
Complete Package
Live Training Benjamin Bowman
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Benjamin Bowman
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Benjamin Bowman
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Benjamin Bowman
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Benjamin Bowman
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Similar Courses
-
Multiple InstructorsLive
Workshop: Foundational Application Security Training with Bill McCauley
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLiveOD
Workshop: SOC Detection Engineering Crash Course with Hayden Covington
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Foundations of Network Forensics and Analysis with Troy Wojewoda
View Course This product has multiple variants. The options may be chosen on the product page