YoVDO

Authorization Best Practices for Systems Using Large Language Models

Offered By: Cloud Security Alliance via YouTube

Tags

Authorization Courses Cybersecurity Courses SQL Injection Courses Vector Databases Courses Cloud Security Courses API Security Courses Retrieval Augmented Generation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore authorization best practices for systems utilizing Large Language Models in this 26-minute conference talk by the Cloud Security Alliance. Gain insights into the unique security considerations that arise with the integration of LLMs, including prompt injection attacks and vector database risks. Discover the components and design patterns involved in LLM-based systems, focusing on authorization implications specific to each element. Learn about best practices and patterns for various use cases, such as retrieval augmented generation (RAG) with vector databases, API calls to external systems, and SQL queries generated by LLMs. Delve into the fundamental concerns surrounding the development of agentic systems, equipping yourself with essential knowledge to build more robust and secure LLM-powered applications.

Syllabus

Authorization best practices for systems using Large Language Models


Taught by

Cloud Security Alliance

Related Courses

Pinecone Vercel Starter Template and RAG - Live Code Review Part 2
Pinecone via YouTube
Will LLMs Kill Search? The Future of Information Retrieval
Aleksa Gordić - The AI Epiphany via YouTube
RAG But Better: Rerankers with Cohere AI - Improving Retrieval Pipelines
James Briggs via YouTube
Advanced RAG - Contextual Compressors and Filters - Lecture 4
Sam Witteveen via YouTube
LangChain Multi-Query Retriever for RAG - Advanced Technique for Broader Vector Space Search
James Briggs via YouTube