Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

SEC545: GenAI and LLM Application Security

SEC545Cloud Security
  • 3 Days (Instructor-Led)
  • 18 Hours (Self-Paced)
Course created by:
Ahmed Abugharbia
Ahmed Abugharbia
SEC545: GenAI and LLM Application Security
Course created by:
Ahmed Abugharbia
Ahmed Abugharbia
  • 18 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Advanced Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 11 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Secure the full GenAI lifecycle, mastering hands-on strategies to defend LLMs, agents, and RAG-powered apps from development to deployment.

Course Overview

SEC545 explores GenAI security, from core concepts like LLMs and RAG to real-world risks like prompt injection and supply chain threats. Students learn to build, secure, and deploy GenAI apps using best practices for tools like LangChain, agents, and cloud platforms such as AWS Bedrock.

What You’ll Learn

  • Understand GenAI and LLMs, and examine LangChain agents and MCP
  • Explore models, tools, fine-tuning, and customization options
  • Identify GenAI-specific risks and mitigations
  • Secure RAG pipelines, embeddings, and vector databases
  • Apply security controls in GenAI operations
  • Compare secure hosting, deployment, and cloud options
  • Integrate GenAI into existing security frameworks

Business Takeaways

  • Understand GenAI applications
  • Identify potential risks associated with GenAI applications
  • Learn how to mitigate GenAI risks effectively

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC545: GenAI and LLM Application Security.

Section 1GenAI, Large Language Models (LLMs), and Security Risks

The course starts with GenAI fundamentals, covering key concepts like Large Language Models (LLMs), embeddings, and Retrieval-Augmented Generation (RAG). Students will explore security risks unique to GenAI, including prompt injection, malicious models, and third-party supply chain vulnerabilities.

Topics covered

  • GenAI Introduction and Concepts
  • Fine-Tuning Models
  • Augmenting GenAI Knowledge
  • Safe Use and Moderation

Labs

  • LLMs and Prompt Injection
  • Fine-tuning OpenAI Models
  • Compromising Vector Database
  • Safe Use and Moderation

Section 2Securing GenAI Applications

Building on section 1, students explore core components for GenAI apps, like vector databases, LangChain, AI agents, and MCP. Section 2 also covers deployment strategies, comparing cloud and on-premises setups with a focus on the security risks unique to each.

Topics covered

  • Hosting GenAI Applications
  • GenAI Applications Architecture
  • Agentic AI
  • Langchain Security

Labs

  • AWS Bedrock
  • Pivoting from LLMs
  • Compromising LLM Supply Chain
  • Langchain Security

Section 3MLSecOps and Securing the GenAI Applications Lifecycle

In the third and final section, students focus on MLSecOps—the integration of security operations into the machine learning lifecycle—and conclude by learning advanced threat modeling techniques aimed at identifying, assessing, and comprehensively mitigating risks.

Topics covered

  • Machine Learning Security Operations (MLSecOps)
  • Threat Modeling

Labs

  • Model Serialization Attacks
  • MLSecOps – Securing AI Deployment Pipeline
  • Capture the Flag

Things You Need To Know

Relevant Job Roles

Cybersecurity Architecture (OPM 652)

NICE: Design and Development

Responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.

Explore learning path

Technology Research and Development (OPM 661)

NICE: Design and Development

Responsible for conducting software and systems engineering and software systems research to develop new capabilities with fully integrated cybersecurity. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.

Explore learning path

Network Operations (OPM 441)

NICE: Implementation and Operation

Responsible for planning, implementing, and operating network services and systems, including hardware and virtual environments.

Explore learning path

Software Security Assessment (OPM 622)

NICE: Design and Development

Responsible for analyzing the security of new or existing computer applications, software, or specialized utility programs and delivering actionable results.

Explore learning path

Enterprise Architecture (OPM 651)

NICE: Design and Development

Responsible for developing and maintaining business, systems, and information processes to support enterprise mission needs. Develops technology rules and requirements that describe baseline and target architectures.

Explore learning path

Secure Systems Development

NICE: Design and Development

Responsible for the secure design, development, and testing of systems and the evaluation of system security throughout the systems development life cycle.

Explore learning path

Secure Software Development (OPM 621)

NICE: Design and Development

Responsible for developing, creating, modifying, and maintaining computer applications, software, or specialized utility programs.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchasing Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Ahmed Abugharbia
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $5,250 USD*Prices exclude applicable local taxesBuy now for access on Jul 16. Use code Presale10 for 10% off course price!
    Enrollment options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by Ahmed Abugharbia
    Date & Time
    Fetching schedule..View event details
    Course price
    $5,250 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Virtual (live)

    Instructed by Ahmed Abugharbia
    Date & Time
    Fetching schedule..View event details
    Course price
    €4,935 EUR*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Virtual (live)

    Instructed by Jon Zeolla
    Date & Time
    Fetching schedule..View event details
    Course price
    $5,250 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Singapore, SG & Virtual (live)

    Instructed by Ahmed Abugharbia
    Date & Time
    Fetching schedule..View event details
    Course price
    $5,325 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Virtual (live)

    Instructed by Ahmed Abugharbia
    Date & Time
    Fetching schedule..View event details
    Course price
    $5,250 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Dubai, AE & Virtual (live)

    Instructed by Ahmed Abugharbia
    Date & Time
    Fetching schedule..View event details
    Course price
    $5,325 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by Jon Zeolla
    Date & Time
    Fetching schedule..View event details
    Course price
    $5,250 USD*Prices exclude applicable local taxes
    Enrollment options
Showing 8 of 9

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources