LLM course icon

LLM course

A 2-day deep dive into AI and LLM fundamentals—through the lens of your hacking adversaries.

This is our 2-day beginner-intermediate LLM course

This course is designed for individuals with a beginner-to-intermediate understanding of artificial intelligence and cybersecurity. Whether you are a security consultant, developer, AI/LLM architect, or prompt engineer, you should have a foundational grasp of AI/LLM concepts and some experience with cybersecurity practices.

An immersive, intensive 2-day journey into the dynamic world of artificial intelligence.As LLMs increasingly becoming an integral part of various products and services, grasping their implementation nuances and securing these implementations is paramount for maintaining robust, efficient, and trustworthy systems.


2 day practical class


Available by Partners


Live, online available


Beginner-Intermediate

Course Overview

Is it for me?

The rapid adoption of AI and, specifically, Large Language Models (LLMs), has opened new frontiers in innovation. And in attack surfaces...As companies rush to harness the power of LLMs in applications ranging from customer service to data analytics, they often overlook the emerging security gaps introduced by prompt injection, data poisoning, insecure plugin designs, and more.

Our course directly tackles these new challenges. Over two immersive days, you’ll not only uncover high-impact vulnerabilities that could already be at work within your systems but also learn how to patch them before they result in breaches or critical data leaks. In addition, we regularly update our modules and labs to incorporate the latest security breakthroughs, proof-of-concept exploits, and real-world incidents.

This focus on cutting-edge threats and solutions means that attendees can return year after year for fresh insights, continually refining their ability to secure AI-driven environments as new vulnerabilities emerge.

Interested

Interested?

1. Our courses are available directly from us; through our training partners or at worldwide technical conferences.

2. You can find course dates and prices on the Courses and Webinars page.
Click here for course dates, prices and content

3. Take a look below at a few of the upcoming courses for this specific training.

4. For more information including private course requests, complete the short form below.

Enquire about your training

We provide training directly (live, online or in person) and also work with a range of training partners in different locations around the globe for classroom or live, online training. Please contact us with details of your requirement and we will recommend the best route to access our amazing training.

Prerequisites

Who should take this class?

  • Security Professionals
  • Back-End / Front-End Developers
  • System Architects
  • Product Managers
  • Anyone directly involved in the integration and application of LLM technologies

What you will learn:

This course follows a practical “defense by offense” approach, anchored in real-world scenarios and hands-on labs rather than abstract theory. By the end of the course, you’ll be able to:

  • Think and behave like a sophisticated attacker targeting LLM-based systems
    • Understand how attackers discover and exploit prompt injections, insecure output handling, data poisoning, and other vulnerabilities in AI workflows
    • Identify and exploit security weaknesses specific to LLM integrations
    • Practice detecting and attacking common pitfalls (e.g., plugin misconfiguration, overreliance, and supply chain exposures) in real-world lab environments
    • Implement effective prompt engineering and defensive measures
    • Learn to craft prompts that minimize leakage, prevent injection, and ensure your LLM responds reliably within controlled security parameters
    • Design LLM applications with minimal attack surface
    • Explore best practices for restricting AI agent functionality (excessive agency), hardening plugin interfaces, and securing AI-driven workflows
    • Apply forward-thinking strategies to protect training and inference data
    • Develop robust security controls in real-world deployments
    • Translate lab exercises into practical solutions by integrating logging, monitoring, and guardrails for continuous protection of LLM-based services
    • LLM Course

      Course Information

      You can download a copy of the course information below.

      In addition you will also be provided with a student pack, handouts and cheat-sheets if appropriate.

      Download the course information

      Your Training Roadmap

      Offensive Classes

      Hacking training for all levels: new to advanced. Ideal for those preparing for certifications such as CREST CCT (ICE), CREST CCT (ACE), CHECK (CTL), TIGER SST as well as infrastructure / web application penetration testers wishing to add to their existing skill set.

      Defensive Classes

      Giving you the skills needed to get ahead and secure your business by design. We specialise in application security (both secure coding and building security testing into your software development lifecycle) and cloud security. Build security capability into your teams enabling you to move fast and stay secure.

      Our accreditations

      Crest
      Check penetration testing
      Cyber essentials
      CEH Accreditation
      CCISO Accreditation
      CISSP Accreditation
      CRISC Accreditation
      OSCE Accreditation