OWASP Top 10 for Machine Learning Security - A Comprehensive Walkthrough
Offered By: DevSecCon via YouTube
Course Description
Overview
Explore the OWASP Top 10 for Machine Learning Security in this 57-minute conference talk from DevSecCon. Gain practical insights into key security challenges and best practices specific to machine learning. Delve into an in-depth overview of each of the top ten vulnerabilities, including input manipulation, data poisoning, model inversion, model stealing, AI supply chain attacks, transfer learning attacks, model skewing, output integrity attacks, and model poisoning. Learn from real-world examples and case studies illustrating how these vulnerabilities manifest. Discover actionable recommendations for mitigating risks and implementing strategies to ensure robust and secure ML deployments. Equip yourself with essential knowledge to enhance the security posture of machine learning projects, whether you're a developer, data scientist, or security professional.
Syllabus
Introduction
Input Manipulation Attack
Data Poisoning Attack
Model Inversion Attack
Model Stealing
AI Supply Chain Attack
Transfer Learning Attack
Model Skewing Attack
Output Integrity Attack
Model Poisoning Attack
Conclusion
Taught by
DevSecCon
Related Courses
Learning the OWASP Top 10LinkedIn Learning OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
LinkedIn Learning Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals
EC-Council via FutureLearn Pentesting with Daniel Slater (Ethical Hacking/Web Security)
Udemy OWASP Top 10: API Security Playbook
Pluralsight