# practical
24 articlestagged with “practical”
Practical Fine-Tuning Security Assessment
Hands-on assessment of LoRA attacks, alignment removal, and backdoor detection in fine-tuned models.
Practical Incident Response Assessment
Practical assessment simulating an AI security incident with evidence analysis and response procedures.
Skill Verification: Agent Exploitation
Practical skill verification for agent and MCP exploitation techniques.
Skill Verification: Cloud AI Security
Practical verification of cloud AI platform security assessment skills.
Skill Verification: Defense Evaluation
Hands-on verification of ability to evaluate and bypass LLM defense mechanisms.
Skill Verification: Multimodal Attacks
Hands-on verification of multimodal attack capabilities across image, audio, and document modalities.
Skill Verification: Prompt Injection
Hands-on skill verification requiring live exploitation of prompt injection vulnerabilities.
Skill Verification: RAG & Data Attacks
Practical verification of RAG poisoning, embedding attacks, and data extraction techniques.
Skill Verification: Red Team Reporting
Practical assessment of red team report writing and finding communication skills.
Skill Verification: Tool Proficiency
Hands-on verification of proficiency with Garak, PyRIT, Promptfoo, and custom tooling.
Skill Verification: Embedding Attacks
Practical verification of embedding and vector database attack capabilities.
Skill Verification: Fine-Tuning Attacks (Assessment)
Practical verification of fine-tuning attack capabilities including alignment removal and backdoor insertion.
Skill Verification: AI Forensics Investigation
Hands-on verification of AI forensics investigation capabilities with simulated incident scenarios.
Skill Verification: Governance Audit (Assessment)
Practical verification of AI governance audit skills against EU AI Act and NIST AI RMF requirements.
Skill Verification: Guardrail Bypass
Hands-on verification of guardrail bypass techniques across NeMo, LLM Guard, and custom implementations.
Skill Verification: MCP Exploitation (Assessment)
Hands-on verification of MCP server exploitation including tool poisoning and resource manipulation.
Skill Verification: Multi-Agent Testing
Hands-on verification of multi-agent system security testing capabilities.
Skill Verification: Red Team Automation
Practical verification of red team automation skills using Garak, PyRIT, and custom tooling.
Practical Skills Assessment Prep
Preparation guide for hands-on skill verification assessments with practice scenarios.
Practical Membership Inference Attacks
Practical guide to conducting membership inference attacks against deployed language models.
Practical Synthetic Data Poisoning
Poisoning synthetic data generation pipelines used for model training augmentation.
MITRE ATLAS Practical Guide
Practical guide to using MITRE ATLAS for AI threat modeling and attack surface mapping.
Practical Embedding Manipulation
Manipulate text to achieve target embedding similarities for poisoning retrieval augmented generation systems.
Practical Model Fingerprinting Lab
Fingerprint the underlying model behind an API endpoint to identify its type, version, and configuration.