Cybersecurity for Developers: Secure Coding for LLM Applications

Defend your LLM applications against threats

Learn the security mindset, how to prevent threats, and how to find them.

Why Attend

This learning program is for any software developer, software tester, or software architect who wants to prevent threats and find vulnerabilities in software applications. Learn:

  • The mindset of security
  • Most common threats and vulnerabilities for LLM systems
  • Manage security risks with Threat Modeling
  • Apply modern design and architecture practices like Defense in Depth, Zero Trust Security, and the STRIDE model
  • Identify assets and use data flow diagrams to pinpoint potential vulnerabilities
  • Practice pen testing to step into the mindset of an attacker
  • The Defense Triad for LLMs
  • Implementations practices for LLM applications, including chatbots and agents

Who Should Attend

All team members who want to learn how to prevent and find security issues in their LLM software products.

Practical Details

  • Language: English
  • Experiential, hands-on, interactive online learning with practical examples
  • Participants will be awarded a Mozaic Works certificate of completion
Quantity:
- +

Price
Original price was: €1,081.00.Current price is: €781.00.

Agenda

Fundamentals of LLM Software Applications Security

  • Cyberattacks
  • The Need for Application Security
  • Understanding Attackers
  • Security is a Continuous Activity
  • Fundamental Security Issue of LLMs

Common Vulnerabilities of LLM-Based Systems

  • Security Mindset for Developers
  • OWASP Top 10 for LLM Applications
  • Prompt Injection
  • Sensitive Information Disclosure
  • Supply Chain Vulnerabilities for LLMs
  • Data and Model Poisoning
  • Improper Output Handling
  • Excessive Agency
  • System Prompt Leakage

Threat Modeling

  • How to Build a Threat Model
  • Data Flow Diagram
  • Brainstorming Threats
  • The STRIDE Classification of Threats
  • Threat Mitigation

Cyber Defense Principles and Practices

  • Defense In Depth Principle
  • Reduce the Attack Surface
  • Principle of Least Privilege
  • Zero Trust Security Model
  • Principle of Least Visibility

Implementation Practices for Security of LLM applications

  • The LLM Defense Triad
  • Sanitize Inputs
  • Sanitize Output
  • Adversarial Training
  • Ensemble Voting
  • Chain of Trust
  • Limit Execution Privileges
  • Human in the Loop for Important Decisions

What’s Next

More details and full agenda here

Meet Your Trainers

Alex Bolboaca

CTO, Senior Trainer at Mozaic Works

With over 25 years of international experience in the world of software and technology, Alexandru shares about himself: Being deeply passionate about technology creation I am a continuous learner in the field. Between reading, trying out technologies and multiple programming languages, presenting and participating to developer communities and conferences, I have learned enough to write two books and teach hundreds of developers and architects. I love working with smart people who want to get better at what they do, whether it’s team work, communication, management or technical skills. I offer you my passion, my experience and my capacity to adapt to your needs. About Alex

More about Alex Bolboaca >
0
    0
    Your Cart
    Your cart is empty
      Apply Coupon
      Scroll to Top