GenAI Security Training
When integrating GenAI into existing software or developing new LLM products, the security of these systems is particularly crucial to the success of these projects. In this training course, those involved in development will learn how to implement GenAI use cases securely.

At a glance
General information
- 2 days
- on-site or remote
- in German or English
Target group
everyone involved in the development of GenAI software systems: product owners, architects, developers, AI engineers
Application examples
Creating understanding of vulnerabilities and countermeasures in GenAI
Description
The use of generative AI (GenAI) in software products enables the realization of new use cases. Many companies are therefore trying to integrate GenAI into existing software or develop new LLM products. The security of these systems is particularly crucial to the success of these projects.
In this training course, those involved in development learn how GenAI use cases can be implemented securely. They learn which vulnerabilities to be aware of when using LLMs and how to successfully integrate them into software systems. Security gaps in various evolutionary stages of GenAI are examined: from simple chatbots to RAGs to (multi-)agent systems. The significance and impact of vulnerabilities such as prompt injection, data poisoning, or tool abuse can thus be discussed clearly.
Participants will learn important methods for assessing the security of a GenAI application and practice these methods using practical examples. They will interactively learn which secure coding principles to consider when developing software products and also learn how to integrate what they have learned into their everyday development work in a sustainable manner.
Agenda
- Introduction: AI and security
- Vulnerabilities of GenAI
- Security risks of models: data, training, and inference
- Vulnerabilities of chatbots, RAGs, and agents
- Threat modeling for GenAI
- Threat analysis for methodical security
- Frameworks for GenAI software and agent systems
- Secure coding principles
- Principles for secure system design
- Best practices for input validation, authentication, and authorization
- Sustainably secure AI development processes
- Continuous security in design, coding, and testing
- Integration of security activities into agile processes
Typical questions we answer:
- How can developers of GenAI applications identify and assess threats and risks to their software?
- What security requirements should be considered when developing GenAI software, and how can they be implemented?
- What are the best practices for implementing chatbots, RAGs, and agent systems?
- How can security activities be integrated into the agile software lifecycle, and what regulatory requirements must be observed?
- signed certificate of participation
- in-house training
- Customization available (agenda, tech stack, language, etc.)
- small training groups
Why inovex Academy?
Our offerThe inovex Academy has set itself the task of passing on knowledge about methods and technologies that we already use successfully in our projects.
Curated content
Our trainers create a customized training offer based on your requirements.
Customizable tech stack
In exclusive trainings, we can consider your tech stack for the training content.
Individual assistance
If needed, we can tailor the training to a specific use case of your company and work directly based on your data.
Trainers
Our trainers are field-tested experts in their areas of expertise. Through their work in projects, they expand their knowledge day by day and pass on this know-how in their trainings - application-oriented and practice-oriented.

Clemens Hübner
Our training approach
From the needs analysis to the awarding of certificates, we offer customized training courses, flexibly designed and carried out according to your requirements.
If you are interested in in-house training, we will start by identifying your needs and discussing your objectives. This discussion forms the basis for an initial offer.
As soon as the framework data has been clarified, our trainers start adapting the training content. Many of our training courses have a modular structure and offer the opportunity to design the agenda flexibly. Training courses that prepare for certifications, on the other hand, are less flexible. Here, however, you can set the content focus according to your wishes.
You will receive all relevant information in advance of the training. The training will then take place in the room of your choice and at the agreed time. Our trainers will adapt to your requirements.
After completing the training, all participants receive a certificate confirming their participation. You will also have the opportunity to give us feedback on the content and the course. We are always happy to receive praise and suggestions for improvement.
Supplementary information

Collin Rogowski
Head of inovex Academy