Black Friday Sale Happening Now! Learn More

Attacking and Defending AI

Course Authored by , , and .

Attacking and Defending AI/LLM Systems is a hands-on course designed for cybersecurity professionals, red teamers, and AI practitioners seeking to understand and secure modern large language model (LLM) environments.

On-Demand $295.00

Course Length: 8 Hours

Includes a Certificate of Completion



Description

Attacking and Defending AI/LLM Systems is a hands-on course designed for cybersecurity professionals, red teamers, and AI practitioners seeking to understand and secure modern large language model (LLM) environments. Participants will explore how AI systems are built, attacked, and defended through real-world scenarios—covering topics such as prompt injection, data and model poisoning, supply chain threats, and excessive model agency. Using the OpenWebUI platform, attendees will engage in live “Capture the Flag” challenges that simulate offensive and defensive tactics against LLMs, including RAG exploitation, guardrail bypass, and agent abuse. The course also integrates key frameworks such as OWASP’s LLM Top 10, MITRE ATLAS, and NIST’s AI Risk Management Framework, providing a structured foundation for securing AI ecosystems. By the end, students will not only understand how adversaries exploit AI systems but also gain the skills to implement layered defenses and build trustworthy, resilient AI operations

  • System Requirements
    • System with reliable internet connection
  • For those wishing to follow along with the labs or work on them after class:
    • Ubuntu 24.04 LTS (other Ubuntu LTS versions may work, but have not been tested)
    • A GPU with at least 8GB of VRAM (locally or access to a cloud service, such as Digital Ocean, Amazon, Azure, etc)
    • Note: The labs can be run on a CPU-only system but they will be very slow.
    • Alternative option: AWS account with the ability to launch GPU enabled systems

Syllabus

  1. AI & Machine Learning Essentials

    • AI, ML and Deep Learning overview

    • Supervised vs. Unsupervised learning

    • Neural networks and model training

    • Generative vs Discriminative models

    • Practical applications in cybersecurity

  2. Large Language Models (LLMs)

    • What LLMs are and how they work

    • Transformer architecture (encoder, decoder types)

    • Key capabilities: NLP, text generation, reasoning

    • Context windows and system prompts

  3. Prompt Engineering

    • Elements of effective prompts

    • Prompting techniques

      • Zero-shot, few-shot, chain-of-thought

      • Generated knowledge and emotional prompting

    • Iterative refinement strategies

  4. Secure AI System Design

    • Open WebUI architecture and components

    • Retrieval-Augmented Generation (RAG) flow

    • Tools and pipelines in Open WebUI

    • Deploying filters (e.g. prompt injection, PII, toxicity)

  5. AI Security Threats

    • AI safety vs. security concerns

    • OWASP LLM Top 10 risks

    • Common attack vectors:

      • Prompt injection, system prompt leaks, jailbreaking

      • Role deception, confusion tactics, custom encoding

      • External malicious content, escalation chains

  6. Offensive AI Examples with hands on Capture the Flag Challenge

    • Adversarial LLM prompt design

    • Bypassing safeguards

    • Leveraging agentic and interpreter capabilities

    • Attacking RAG

    • Tooling to assist with attacks and assessments

FAQ

Who Should Take This Class

This course will benefit both red team and blue team security professionals who are looking to gain a better understanding of AI-LLM applications and potential security risks that are associated with these applications. The workshop assumes no prior knowledge of the technologies involved.

Audience Skill Level

The target audience for this course are beginners to this area, although the course can still benefit those who have some familiarity with the material.

About the Instructors

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.