
This workshop starts with AI-LLM application fundamentals, moving to a reference architecture based on Open WebUI, and then discusses related threats and vulnerabilities.
Live Training $50 - $150
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date: September 25th, 2025 @ 11:00 AM EDT
Description
As AI-LLM based applications are being ubiquitously integrated into more applications today, cyber security red teamers need to understand the security vulnerabilities, tools, and methodology to effectively perform penetration testing activities that are unique to these deployments.
This workshop starts with AI-LLM application fundamentals, moving to a reference architecture based on Open WebUI, and then discusses related threats and vulnerabilities. Demonstration labs will cover red teaming use cases against an Open WebUI reference architecture, which is analogous to many real-world AI-LLM deployments. Students will be provided with scripting to stand up their own vulnerable AI-LLM implementations for further practice.
By the end of this workshop, participants will have both the foundational understanding and tactical insight necessary to evaluate and secure AI-LLM applications. Students will have an understanding of terminology associated with AI-LLMs, prompt-based defenses, input and output filtering, AI-based protections, Retrieval Augmented Generation (RAG) concerns, agentic risks, and the dangers of code interpreters. Participants will also be exposed to tooling that assists in assessing AI-LLM applications.
System Requirements
-
Student Requirements
- System with reliable internet connection
-
For those wishing to follow along with the labs or work on them after class:
- Ubuntu 24.04 LTS (other Ubuntu LTS versions may work, but have not been tested)
- A GPU with at least 8GB of VRAM (locally or access to a cloud service, such as Digital Ocean, Amazon, Azure, etc.)
- Note: The labs can be run on a CPU-only system but they will be very slow
Syllabus
Workshop Syllabus: Hacking AI-LLM Applications
- AI & Machine Learning Essentials
- AI, ML, and Deep Learning overview
- Supervised vs. Unsupervised learning
- Neural networks and model training
- Generative vs. Discriminative models
- Practical applications in cybersecurity
- Large Language Models (LLMs)
- What LLMs are and how they work
- Transformer architecture (encoder, decoder types)
- Key capabilities: NLP, text generation, reasoning
- Context windows and system prompts
- Prompt Engineering
- Elements of effective prompts
- Prompting techniques:
- Zero-shot, few-shot, chain-of-thought
- Generated knowledge and emotional prompting
- Iterative refinement strategies
- Secure AI System Design
- Open WebUI architecture and components
- Retrieval-Augmented Generation (RAG) flow
- Vector databases and embedding security risks
- Tools and pipelines in Open WebUI
- Deploying filters (e.g. prompt injection, PII, toxicity)
- AI Security Threats
- AI safety vs. security concerns
- OWASP LLM Top 10 risks
- Common attack vectors:
- Prompt injection, system prompt leaks, jailbreaking
- Role deception, confusion tactics, custom encoding
- External malicious content, escalation chains
- Offensive AI Use Cases (with demonstrations)
- Adversarial LLM prompt design
- Bypassing safeguards
- Leveraging agentic and interpreter capabilities
- Attacking RAG
- Tooling to assist with attacks and assessments
FAQ
About the Instructors

Brian Fehrman
Bio
Brian Fehrman has been with Black Hills Information Security (BHIS) as a Security Researcher and Analyst since 2014, but his interest in security started when his family got their very first computer. Brian holds a BS in Computer Science, an MS in Mechanical Engineering, an MS in Computational Sciences and Robotics, and a PhD in Data Science and Engineering with a focus in Cyber Security. He also holds various industry certifications, such as Offensive Security Certified Professional (OSCP) and GIAC Exploit Researcher and Advanced Penetration Tester (GXPN). He enjoys being able to protect his customers from “the real bad people” and his favorite aspects of security include artificial intelligence, hardware hacking, and red teaming. Outside of time spent working with BHIS, Brian is an avid Brazilian Jiu-Jitsu enthusiast, big game hunter, and enjoys home improvement projects.

Joff Thyer
"I write malware, hack, and teach infosec for a living!"Bio
Joff Thyer has been a Security Analyst with Black Hills Information Security (BHIS) since 2013. He has an associate in Computer Science, a B.S. in Mathematics, and an M.S. in Computer Science, as well as several certifications. The best part of a penetration test for Joff is developing sophisticated malware that tackles defensive solutions, ultimately delivering exciting wins for company engagements.

Derek Banks
"Security Analyst and Data Nerd"Bio
Derek Banks has been with Black Hills Information Security (BHIS) since 2014 as a security analyst, penetration tester and red teamer, and now fulfills a leadership role in the BHIS Security Operations Center (SOC). He has a B.S. in Information Systems and a M.S. in Data Science, as well as several industry certifications. Derek has experience in computer forensics and incident response, creating custom host and network-based logging and monitoring solutions, penetration testing and red teaming.
Register for Upcoming
-
Filter by Product Instructor
-
Filter by Product Date
-
Filter by Product Type
Workshop: Hacking AI-LLM Applications with Brian Fehrman, Joff Thyer and Derek Banks
Complete Package
Live Training Brian Fehrman , Joff Thyer and Derek Banks
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Brian Fehrman , Joff Thyer and Derek Banks
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Brian Fehrman , Joff Thyer and Derek Banks
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Brian Fehrman , Joff Thyer and Derek Banks
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Similar Courses
-
Multiple InstructorsLive
Workshop: Investigating M365 Business Email Compromise with Patterson Cake
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Practical IT Fundamentals with Zach Hill
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: AI Foundation: Cyber Security Workflow Optimization using AI Technology with Joff Thyer and Derek Banks
View Course -
Multiple InstructorsLive
Workshop: Hands on Kerberos with Tim Medin
View Course