Certified - AI Security Audio Course
Episodes
Welcome to the AI Security Course
14 Oct 2025
Contributed by Lukas
Episode 50 — Automated Adversarial Generation
15 Sep 2025
Contributed by Lukas
This episode examines automated adversarial generation, where AI systems are used to create adversarial examples, fuzz prompts, and continuously probe...
Episode 49 — Confidential Computing for AI
15 Sep 2025
Contributed by Lukas
This episode introduces confidential computing as an advanced safeguard for AI workloads, focusing on hardware-based protections such as trusted execu...
Episode 48 — Guardrails Engineering
15 Sep 2025
Contributed by Lukas
This episode covers guardrails engineering, emphasizing the design of policy-driven controls that prevent unsafe or unauthorized AI outputs. Guardrail...
Episode 47 — On-Device & Edge AI Security
15 Sep 2025
Contributed by Lukas
This episode examines on-device and edge AI security, focusing on models deployed in mobile, IoT, or embedded systems where resources are constrained ...
Episode 46 — Multimodal & Cross-Modal Security
15 Sep 2025
Contributed by Lukas
This episode introduces multimodal and cross-modal security, focusing on AI systems that process images, audio, video, and text simultaneously. For ce...
Episode 45 — Program Management Patterns (30/60/90)
15 Sep 2025
Contributed by Lukas
This episode introduces program management patterns for phased AI security adoption, with emphasis on the 30/60/90-day framework. For certification re...
Episode 44 — People & Process
15 Sep 2025
Contributed by Lukas
This episode focuses on people and process as integral elements of AI security, highlighting how organizational culture and defined responsibilities r...
Episode 43 — Enterprise Architecture Patterns
15 Sep 2025
Contributed by Lukas
This episode examines enterprise architecture patterns for secure AI deployments, focusing on how organizations structure systems to balance scalabili...
Episode 42 — Third-Party & Vendor Risk
15 Sep 2025
Contributed by Lukas
This episode explores third-party and vendor risk management in AI security, focusing on the challenges of relying on external providers for models, d...
Episode 41 — Legal & Compliance Horizon (High-Level)
15 Sep 2025
Contributed by Lukas
This episode introduces the legal and compliance horizon for AI security, giving learners a high-level view of regulatory landscapes without overwhelm...
Episode 40 — Content Provenance & Watermarking
15 Sep 2025
Contributed by Lukas
This episode examines content provenance and watermarking as methods to authenticate AI-generated or human-created content, providing assurance of ori...
Episode 39 — Deepfakes & Synthetic Media Risk
15 Sep 2025
Contributed by Lukas
This episode explores the risks of deepfakes and synthetic media, examining how generative AI enables the creation of realistic but deceptive audio, v...
Episode 38 — Incident Response for AI Events
15 Sep 2025
Contributed by Lukas
This episode addresses incident response for AI-specific security events, focusing on structured detection, containment, and remediation. Learners mus...
Episode 37 — Secure SDLC for AI
15 Sep 2025
Contributed by Lukas
This episode examines the secure software development lifecycle (SDLC) for AI, emphasizing integration of security at each stage of system creation. L...
Episode 36 — OWASP GenAI/LLM Top 10
15 Sep 2025
Contributed by Lukas
This episode introduces the OWASP GenAI/LLM Top 10, a structured list of the most critical risks associated with generative AI and large language mode...
Episode 35 — Threat Modeling for AI
15 Sep 2025
Contributed by Lukas
This episode covers threat modeling as a structured method for identifying and prioritizing risks in AI systems. Learners must understand the role of ...
Episode 34 — Risk Frameworks in Practice
15 Sep 2025
Contributed by Lukas
This episode examines risk frameworks for AI security, focusing on the NIST AI Risk Management Framework and ISO/IEC 42001. These frameworks provide s...
Episode 33 — Governance & Acceptable Use
15 Sep 2025
Contributed by Lukas
This episode introduces governance and acceptable use policies as organizational frameworks that guide secure and ethical AI adoption. Governance defi...
Episode 32 — Keys, Encryption & Attestation
15 Sep 2025
Contributed by Lukas
This episode examines keys, encryption, and attestation as core mechanisms for ensuring confidentiality, integrity, and trust in AI systems. Keys form...
Episode 31 — Cloud & Infra for AI
15 Sep 2025
Contributed by Lukas
This episode explores cloud and infrastructure security in the context of AI, focusing on GPU clusters, multitenancy, storage, and network isolation. ...
Episode 30 — Connector/Plugin Security
15 Sep 2025
Contributed by Lukas
This episode addresses connector and plugin security, focusing on how third-party integrations expand the attack surface of AI applications. Connector...
Episode 29 — Code Execution & Sandboxing
15 Sep 2025
Contributed by Lukas
This episode examines the risks of code execution in AI systems and the security benefits of sandboxing. Many AI applications incorporate features all...
Episode 28 — API Gateways & Proxies for AI
15 Sep 2025
Contributed by Lukas
This episode focuses on API gateways and proxies, emphasizing their role as critical control points for AI applications. An API gateway manages traffi...
Episode 27 — Secure Fine-Tuning & Adaptation
15 Sep 2025
Contributed by Lukas
This episode introduces secure fine-tuning and adaptation, explaining how customization of pre-trained models introduces both benefits and new risks. ...
Episode 26 — Supply Chain & Artifacts
15 Sep 2025
Contributed by Lukas
This episode examines supply chain and artifact security, focusing on how external dependencies and stored components create systemic risks in AI syst...
Episode 25 — MLOps & Serving Security
15 Sep 2025
Contributed by Lukas
This episode introduces MLOps and serving security, focusing on practices that protect the deployment, operation, and continuous delivery of AI models...
Episode 24 — Cost & Resource Abuse
15 Sep 2025
Contributed by Lukas
This episode examines cost and resource abuse, where adversaries or careless users exploit AI systems to drive up compute expenses or deny service to ...
Episode 23 — Abuse & Fraud Detection
15 Sep 2025
Contributed by Lukas
This episode addresses abuse and fraud detection in AI applications, focusing on how adversaries exploit systems for spam, phishing, or marketplace ma...
Episode 22 — Telemetry & Observability
15 Sep 2025
Contributed by Lukas
This episode explores telemetry and observability, emphasizing their importance in detecting anomalies, intrusions, and misuse in AI systems. Telemetr...
Episode 21 — Evals & Test Pipelines
15 Sep 2025
Contributed by Lukas
This episode examines evaluations and test pipelines as essential processes for maintaining AI system security and reliability. Evaluations, or “eva...
Episode 20 — Red Teaming Strategy for GenAI
15 Sep 2025
Contributed by Lukas
This episode introduces red teaming as a structured method for probing generative AI systems for vulnerabilities, emphasizing its importance for both ...
Episode 19 — Output Validation & Policy Enforcement
15 Sep 2025
Contributed by Lukas
This episode examines output validation and policy enforcement as mechanisms for controlling what AI systems produce before results are delivered to u...
Episode 18 — AuthN/Z for LLM Apps
15 Sep 2025
Contributed by Lukas
This episode explores authentication (AuthN) and authorization (AuthZ) for large language model (LLM) applications, highlighting their importance in m...
Episode 17 — Secrets & Credential Hygiene
15 Sep 2025
Contributed by Lukas
This episode addresses secrets and credential hygiene, emphasizing their critical role in preventing leaks and privilege misuse in AI systems. Secrets...
Episode 16 — Agents as an Attack Surface
15 Sep 2025
Contributed by Lukas
This episode introduces AI agents as a new and growing attack surface, highlighting how their autonomy and tool integration create unique risks. Agent...
Episode 15 — RAG Security II: Context Filtering & Grounding
15 Sep 2025
Contributed by Lukas
This episode continues exploration of RAG security by examining context filtering and grounding as defenses for reliable outputs. Learners must unders...
Episode 14 — RAG Security I: Retrieval & Index Hardening
15 Sep 2025
Contributed by Lukas
This episode explores retrieval-augmented generation (RAG) security, focusing on retrieval and index hardening as foundational defenses. RAG combines ...
Episode 13 — Adversarial Evasion
15 Sep 2025
Contributed by Lukas
This episode introduces adversarial evasion, a class of attacks in which maliciously crafted inputs cause AI systems to misclassify or behave incorrec...
Episode 12 — Model Theft & Extraction
15 Sep 2025
Contributed by Lukas
This episode addresses model theft and extraction, highlighting how adversaries can replicate or steal valuable AI models. Model theft occurs when pro...
Episode 11 — Privacy-Preserving Techniques
15 Sep 2025
Contributed by Lukas
This episode explores privacy-preserving techniques designed to reduce the risk of sensitive information exposure in AI systems while maintaining util...
Episode 10 — Privacy Attacks
15 Sep 2025
Contributed by Lukas
This episode introduces privacy attacks in AI systems, focusing on techniques that reveal sensitive or personal information from training data or mode...
Episode 9 — Training-Time Integrity
15 Sep 2025
Contributed by Lukas
This episode covers training-time integrity, focusing on the assurance that data, processes, and infrastructure used in model development remain uncom...
Episode 8 — Data Poisoning Attacks
15 Sep 2025
Contributed by Lukas
This episode introduces data poisoning as a high-priority threat in AI security, where adversaries deliberately insert malicious samples into training...
Episode 7 — Content Safety vs. Security
15 Sep 2025
Contributed by Lukas
This episode explains the distinction and overlap between content safety and security in AI systems, a concept often emphasized in both professional p...
Episode 6 — Prompt Security II: Indirect & Cross-Domain Injections
15 Sep 2025
Contributed by Lukas
This episode examines indirect and cross-domain prompt injections, which expand the attack surface by embedding malicious instructions in external sou...
Episode 5 — Prompt Security I: Injection & Jailbreaks
15 Sep 2025
Contributed by Lukas
This episode introduces prompt injection and jailbreaks as fundamental AI-specific security risks. It defines prompt injection as malicious manipulati...
Episode 4 — Data Lifecycle Security
15 Sep 2025
Contributed by Lukas
This episode examines data lifecycle security, covering the journey of data from collection and labeling through storage, retention, deletion, and pro...
Episode 3 — System Architecture & Trust Boundaries
15 Sep 2025
Contributed by Lukas
This episode explains the architecture of AI systems, breaking down their stages and components to show how trust boundaries shift across the lifecycl...
Episode 2 — The AI Security Landscape
15 Sep 2025
Contributed by Lukas
This episode defines the AI security landscape by mapping the assets, attack surfaces, and emerging threats that distinguish AI from classical applica...
Episode 1 — Course Overview & How to Use This Prepcast
15 Sep 2025
Contributed by Lukas
This opening episode provides a structured orientation to the AI Security and Threats Audio course series, helping listeners understand what the progr...