GenAI Security Training

When integrating GenAI into existing software or developing new LLM products, the security of these systems is particularly crucial to the success of these projects. In this training course, those involved in development will learn how to implement GenAI use cases securely.

Request now
Ein Icon, das ein Gehirn darstellt, umgeben von einer Kette und einem grünen Schloss.

At a glance

General information

  • 2 days
  • on-site or remote
  • in German or English

Target group

everyone involved in the development of GenAI software systems: product owners, architects, developers, AI engineers

Application examples

Creating understanding of vulnerabilities and countermeasures in GenAI

Description

The use of generative AI (GenAI) in software products enables the realization of new use cases. Many companies are therefore trying to integrate GenAI into existing software or develop new LLM products. The security of these systems is particularly crucial to the success of these projects.

In this training course, those involved in development learn how GenAI use cases can be implemented securely. They learn which vulnerabilities to be aware of when using LLMs and how to successfully integrate them into software systems. Security gaps in various evolutionary stages of GenAI are examined: from simple chatbots to RAGs to (multi-)agent systems. The significance and impact of vulnerabilities such as prompt injection, data poisoning, or tool abuse can thus be discussed clearly.

Participants will learn important methods for assessing the security of a GenAI application and practice these methods using practical examples. They will interactively learn which secure coding principles to consider when developing software products and also learn how to integrate what they have learned into their everyday development work in a sustainable manner.

Agenda

  • Introduction: AI and security
  • Vulnerabilities of GenAI
    • Security risks of models: data, training, and inference
    • Vulnerabilities of chatbots, RAGs, and agents
  • Threat modeling for GenAI
    • Threat analysis for methodical security
    • Frameworks for GenAI software and agent systems
  • Secure coding principles
    • Principles for secure system design
    • Best practices for input validation, authentication, and authorization
  • Sustainably secure AI development processes
    • Continuous security in design, coding, and testing
    • Integration of security activities into agile processes

Typical questions we answer:

  • How can developers of GenAI applications identify and assess threats and risks to their software?
  • What security requirements should be considered when developing GenAI software, and how can they be implemented?
  • What are the best practices for implementing chatbots, RAGs, and agent systems?
  • How can security activities be integrated into the agile software lifecycle, and what regulatory requirements must be observed?
GenAI Security Training
  • signed certificate of participation
  • in-house training
  • Customization available (agenda, tech stack, language, etc.)
  • small training groups
Request now

Why inovex Academy?

Our offer

The inovex Academy has set itself the task of passing on knowledge about methods and technologies that we already use successfully in our projects.

Curated content

Our trainers create a customized training offer based on your requirements.

Customizable tech stack

In exclusive trainings, we can consider your tech stack for the training content.

Individual assistance

If needed, we can tailor the training to a specific use case of your company and work directly based on your data.

Trainers

Our trainers are field-tested experts in their areas of expertise. Through their work in projects, they expand their knowledge day by day and pass on this know-how in their trainings - application-oriented and practice-oriented.

Portraitfoto von Clemens Hübner

Clemens Hübner

ISTOB Zertifizierung
Certified Professional for Project Management Badge
Clemens Hübner has been working at the intersection of software development and security since 2013. After working as a software developer and in penetration testing, he joined inovex as a security engineer in 2018. Today, he supports development projects at concept and implementation level, trains colleagues and customers and advises on DevSecOps. He is invited to speak at conferences in Germany and abroad on current application security topics.

Our training approach

From the needs analysis to the awarding of certificates, we offer customized training courses, flexibly designed and carried out according to your requirements.

If you are interested in in-house training, we will start by identifying your needs and discussing your objectives. This discussion forms the basis for an initial offer.

As soon as the framework data has been clarified, our trainers start adapting the training content. Many of our training courses have a modular structure and offer the opportunity to design the agenda flexibly. Training courses that prepare for certifications, on the other hand, are less flexible. Here, however, you can set the content focus according to your wishes.

You will receive all relevant information in advance of the training. The training will then take place in the room of your choice and at the agreed time. Our trainers will adapt to your requirements.

After completing the training, all participants receive a certificate confirming their participation. You will also have the opportunity to give us feedback on the content and the course. We are always happy to receive praise and suggestions for improvement.

Foto von Collin Rogowski
Collin Rogowski
Head of inovex Academy
inovex Logo
Go back
Foto von Collin Rogowski

I look forward to your inquiry.

Collin Rogowski

We are your partner for successful trainings

We would be happy to talk to you personally about your concerns. Get in touch now!

Foto von Collin Rogowski
Collin Rogowski
Head of inovex Academy
  • Individual training offer for your company
  • Over 25 years of experience as inovex Academy