Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Certified - AI Security Audio Course

Technology Education

Activity Overview

Episode publication activity over the past year

Episodes

Welcome to the AI Security Course

14 Oct 2025

Contributed by Lukas

Episode 50 — Automated Adversarial Generation

15 Sep 2025

Contributed by Lukas

This episode examines automated adversarial generation, where AI systems are used to create adversarial examples, fuzz prompts, and continuously probe...

Episode 49 — Confidential Computing for AI

15 Sep 2025

Contributed by Lukas

This episode introduces confidential computing as an advanced safeguard for AI workloads, focusing on hardware-based protections such as trusted execu...

Episode 48 — Guardrails Engineering

15 Sep 2025

Contributed by Lukas

This episode covers guardrails engineering, emphasizing the design of policy-driven controls that prevent unsafe or unauthorized AI outputs. Guardrail...

Episode 47 — On-Device & Edge AI Security

15 Sep 2025

Contributed by Lukas

This episode examines on-device and edge AI security, focusing on models deployed in mobile, IoT, or embedded systems where resources are constrained ...

Episode 46 — Multimodal & Cross-Modal Security

15 Sep 2025

Contributed by Lukas

This episode introduces multimodal and cross-modal security, focusing on AI systems that process images, audio, video, and text simultaneously. For ce...

Episode 45 — Program Management Patterns (30/60/90)

15 Sep 2025

Contributed by Lukas

This episode introduces program management patterns for phased AI security adoption, with emphasis on the 30/60/90-day framework. For certification re...

Episode 44 — People & Process

15 Sep 2025

Contributed by Lukas

This episode focuses on people and process as integral elements of AI security, highlighting how organizational culture and defined responsibilities r...

Episode 43 — Enterprise Architecture Patterns

15 Sep 2025

Contributed by Lukas

This episode examines enterprise architecture patterns for secure AI deployments, focusing on how organizations structure systems to balance scalabili...

Episode 42 — Third-Party & Vendor Risk

15 Sep 2025

Contributed by Lukas

This episode explores third-party and vendor risk management in AI security, focusing on the challenges of relying on external providers for models, d...

Episode 41 — Legal & Compliance Horizon (High-Level)

15 Sep 2025

Contributed by Lukas

This episode introduces the legal and compliance horizon for AI security, giving learners a high-level view of regulatory landscapes without overwhelm...

Episode 40 — Content Provenance & Watermarking

15 Sep 2025

Contributed by Lukas

This episode examines content provenance and watermarking as methods to authenticate AI-generated or human-created content, providing assurance of ori...

Episode 39 — Deepfakes & Synthetic Media Risk

15 Sep 2025

Contributed by Lukas

This episode explores the risks of deepfakes and synthetic media, examining how generative AI enables the creation of realistic but deceptive audio, v...

Episode 38 — Incident Response for AI Events

15 Sep 2025

Contributed by Lukas

This episode addresses incident response for AI-specific security events, focusing on structured detection, containment, and remediation. Learners mus...

Episode 37 — Secure SDLC for AI

15 Sep 2025

Contributed by Lukas

This episode examines the secure software development lifecycle (SDLC) for AI, emphasizing integration of security at each stage of system creation. L...

Episode 36 — OWASP GenAI/LLM Top 10

15 Sep 2025

Contributed by Lukas

This episode introduces the OWASP GenAI/LLM Top 10, a structured list of the most critical risks associated with generative AI and large language mode...

Episode 35 — Threat Modeling for AI

15 Sep 2025

Contributed by Lukas

This episode covers threat modeling as a structured method for identifying and prioritizing risks in AI systems. Learners must understand the role of ...

Episode 34 — Risk Frameworks in Practice

15 Sep 2025

Contributed by Lukas

This episode examines risk frameworks for AI security, focusing on the NIST AI Risk Management Framework and ISO/IEC 42001. These frameworks provide s...

Episode 33 — Governance & Acceptable Use

15 Sep 2025

Contributed by Lukas

This episode introduces governance and acceptable use policies as organizational frameworks that guide secure and ethical AI adoption. Governance defi...

Episode 32 — Keys, Encryption & Attestation

15 Sep 2025

Contributed by Lukas

This episode examines keys, encryption, and attestation as core mechanisms for ensuring confidentiality, integrity, and trust in AI systems. Keys form...

Episode 31 — Cloud & Infra for AI

15 Sep 2025

Contributed by Lukas

This episode explores cloud and infrastructure security in the context of AI, focusing on GPU clusters, multitenancy, storage, and network isolation. ...

Episode 30 — Connector/Plugin Security

15 Sep 2025

Contributed by Lukas

This episode addresses connector and plugin security, focusing on how third-party integrations expand the attack surface of AI applications. Connector...

Episode 29 — Code Execution & Sandboxing

15 Sep 2025

Contributed by Lukas

This episode examines the risks of code execution in AI systems and the security benefits of sandboxing. Many AI applications incorporate features all...

Episode 28 — API Gateways & Proxies for AI

15 Sep 2025

Contributed by Lukas

This episode focuses on API gateways and proxies, emphasizing their role as critical control points for AI applications. An API gateway manages traffi...

Episode 27 — Secure Fine-Tuning & Adaptation

15 Sep 2025

Contributed by Lukas

This episode introduces secure fine-tuning and adaptation, explaining how customization of pre-trained models introduces both benefits and new risks. ...

Episode 26 — Supply Chain & Artifacts

15 Sep 2025

Contributed by Lukas

This episode examines supply chain and artifact security, focusing on how external dependencies and stored components create systemic risks in AI syst...

Episode 25 — MLOps & Serving Security

15 Sep 2025

Contributed by Lukas

This episode introduces MLOps and serving security, focusing on practices that protect the deployment, operation, and continuous delivery of AI models...

Episode 24 — Cost & Resource Abuse

15 Sep 2025

Contributed by Lukas

This episode examines cost and resource abuse, where adversaries or careless users exploit AI systems to drive up compute expenses or deny service to ...

Episode 23 — Abuse & Fraud Detection

15 Sep 2025

Contributed by Lukas

This episode addresses abuse and fraud detection in AI applications, focusing on how adversaries exploit systems for spam, phishing, or marketplace ma...

Episode 22 — Telemetry & Observability

15 Sep 2025

Contributed by Lukas

This episode explores telemetry and observability, emphasizing their importance in detecting anomalies, intrusions, and misuse in AI systems. Telemetr...

Episode 21 — Evals & Test Pipelines

15 Sep 2025

Contributed by Lukas

This episode examines evaluations and test pipelines as essential processes for maintaining AI system security and reliability. Evaluations, or “eva...

Episode 20 — Red Teaming Strategy for GenAI

15 Sep 2025

Contributed by Lukas

This episode introduces red teaming as a structured method for probing generative AI systems for vulnerabilities, emphasizing its importance for both ...

Episode 19 — Output Validation & Policy Enforcement

15 Sep 2025

Contributed by Lukas

This episode examines output validation and policy enforcement as mechanisms for controlling what AI systems produce before results are delivered to u...

Episode 18 — AuthN/Z for LLM Apps

15 Sep 2025

Contributed by Lukas

This episode explores authentication (AuthN) and authorization (AuthZ) for large language model (LLM) applications, highlighting their importance in m...

Episode 17 — Secrets & Credential Hygiene

15 Sep 2025

Contributed by Lukas

This episode addresses secrets and credential hygiene, emphasizing their critical role in preventing leaks and privilege misuse in AI systems. Secrets...

Episode 16 — Agents as an Attack Surface

15 Sep 2025

Contributed by Lukas

This episode introduces AI agents as a new and growing attack surface, highlighting how their autonomy and tool integration create unique risks. Agent...

Episode 15 — RAG Security II: Context Filtering & Grounding

15 Sep 2025

Contributed by Lukas

This episode continues exploration of RAG security by examining context filtering and grounding as defenses for reliable outputs. Learners must unders...

Episode 14 — RAG Security I: Retrieval & Index Hardening

15 Sep 2025

Contributed by Lukas

This episode explores retrieval-augmented generation (RAG) security, focusing on retrieval and index hardening as foundational defenses. RAG combines ...

Episode 13 — Adversarial Evasion

15 Sep 2025

Contributed by Lukas

This episode introduces adversarial evasion, a class of attacks in which maliciously crafted inputs cause AI systems to misclassify or behave incorrec...

Episode 12 — Model Theft & Extraction

15 Sep 2025

Contributed by Lukas

This episode addresses model theft and extraction, highlighting how adversaries can replicate or steal valuable AI models. Model theft occurs when pro...

Episode 11 — Privacy-Preserving Techniques

15 Sep 2025

Contributed by Lukas

This episode explores privacy-preserving techniques designed to reduce the risk of sensitive information exposure in AI systems while maintaining util...

Episode 10 — Privacy Attacks

15 Sep 2025

Contributed by Lukas

This episode introduces privacy attacks in AI systems, focusing on techniques that reveal sensitive or personal information from training data or mode...

Episode 9 — Training-Time Integrity

15 Sep 2025

Contributed by Lukas

This episode covers training-time integrity, focusing on the assurance that data, processes, and infrastructure used in model development remain uncom...

Episode 8 — Data Poisoning Attacks

15 Sep 2025

Contributed by Lukas

This episode introduces data poisoning as a high-priority threat in AI security, where adversaries deliberately insert malicious samples into training...

Episode 7 — Content Safety vs. Security

15 Sep 2025

Contributed by Lukas

This episode explains the distinction and overlap between content safety and security in AI systems, a concept often emphasized in both professional p...

Episode 6 — Prompt Security II: Indirect & Cross-Domain Injections

15 Sep 2025

Contributed by Lukas

This episode examines indirect and cross-domain prompt injections, which expand the attack surface by embedding malicious instructions in external sou...

Episode 5 — Prompt Security I: Injection & Jailbreaks

15 Sep 2025

Contributed by Lukas

This episode introduces prompt injection and jailbreaks as fundamental AI-specific security risks. It defines prompt injection as malicious manipulati...

Episode 4 — Data Lifecycle Security

15 Sep 2025

Contributed by Lukas

This episode examines data lifecycle security, covering the journey of data from collection and labeling through storage, retention, deletion, and pro...

Episode 3 — System Architecture & Trust Boundaries

15 Sep 2025

Contributed by Lukas

This episode explains the architecture of AI systems, breaking down their stages and components to show how trust boundaries shift across the lifecycl...

Episode 2 — The AI Security Landscape

15 Sep 2025

Contributed by Lukas

This episode defines the AI security landscape by mapping the assets, attack surfaces, and emerging threats that distinguish AI from classical applica...

Episode 1 — Course Overview & How to Use This Prepcast

15 Sep 2025

Contributed by Lukas

This opening episode provides a structured orientation to the AI Security and Threats Audio course series, helping listeners understand what the progr...