Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Breaking RAG Systems - Exploiting Vulnerabilities and Hardening Your GenAI Applications

Linux Foundation via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical security vulnerabilities in Retrieval Augmented Generation (RAG) systems through this hands-on conference talk that demonstrates real-world attacks and defensive strategies. Learn how RAG systems, while becoming essential for enterprise GenAI applications, introduce unique security risks that most development teams overlook. Witness live demonstrations of three major attack vectors: hallucination injection techniques that force models to confidently return false information, prompt manipulation methods that bypass business logic restrictions, and vector database poisoning attacks that compromise RAG retrieval results. Discover step-by-step remediation strategies including securing vector databases against poisoning attacks, building multi-stage guardrails to catch manipulated inputs, and implementing robust retrieval validation techniques. Gain practical code patterns and configurations that can be immediately applied to strengthen your own RAG applications against these emerging security threats.

Syllabus

Breaking RAG Systems: Exploiting Vulnerabilities & Hardening Your GenAI Applicatio... Abhinav Sharma

Taught by

Linux Foundation

Reviews

Start your review of Breaking RAG Systems - Exploiting Vulnerabilities and Hardening Your GenAI Applications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.