Curated Learning Paths
Six structured learning paths from beginner to expert specialist, guiding you through the AI red teaming curriculum in the optimal order.
Path 1: AI Red Team Foundations (Beginner)
For: Security professionals new to AI, developers interested in AI security Duration: ~40 hours
Phase 1: Understanding AI Systems (10h)
- How LLMs Work -- Transformer architecture, tokenization, inference
- Embeddings & RAG -- Vector representations and retrieval
- AI System Architecture -- APIs, agents, deployment patterns
Phase 2: Core Attack Techniques (15h)
- Prompt Injection -- Direct and indirect injection
- Jailbreak Techniques -- Bypassing safety training
- Agent Exploitation -- Tool abuse and manipulation
- RAG & Data Attacks -- Data poisoning and extraction
Phase 3: Hands-On Practice (15h)
- Lab: Environment Setup
- Lab: First Injection
- Complete all remaining Beginner Labs
Path 2: Professional Red Teamer (Intermediate)
For: Graduates of Path 1, penetration testers adding AI to their toolkit Duration: ~80 hours
- Defense Overview -- Understanding what you're attacking
- All Intermediate Labs -- Agent exploitation, RAG poisoning, defense bypass
- Recon & Tradecraft -- Target profiling and prompt discovery
- Red Team Tooling -- Garak, PyRIT, promptfoo, Inspect AI
- Engagement Planning -- Scoping and methodology
- Report Writing -- Executive summaries and technical findings
Path 3: Advanced Techniques (Advanced)
For: Working red teamers seeking deeper technical skills Duration: ~120 hours
- Advanced LLM Internals -- Activation analysis, embedding exploitation
- Injection Research -- Blind injection, jailbreak fuzzing
- Advanced Agentic Exploitation -- MCP, multi-agent, memory poisoning
- Training Pipeline Attacks -- Architecture, pre-training, fine-tuning
- All Advanced Labs -- CART pipelines, adversarial suffixes, guardrail chaining
Path 4: Multimodal Specialist (Advanced)
For: Red teamers specializing in vision, audio, and cross-modal attacks Duration: ~60 hours
- Vision-Language Models -- Architecture, image injection, adversarial images
- Audio & Speech -- Speech recognition, adversarial audio, voice cloning
- Video & Temporal -- Temporal manipulation, video understanding
- Cross-Modal Attacks -- Modality bridging, document attacks
Path 5: Governance & Program Building (Mixed)
For: Security leaders, compliance officers, program managers Duration: ~40 hours
- Legal & Ethics -- Authorization, international law, ethics
- Frameworks & Standards -- OWASP, MITRE ATLAS, NIST, EU AI Act
- Evaluation & Benchmarking -- Metrics, harnesses, statistical rigor
- Building a Program -- Program design and metrics
Path 6: Frontier Research (Expert)
For: Researchers pushing the boundaries of AI security Duration: ~80 hours
- Reasoning Model Attacks -- CoT exploitation, thought injection
- AI-Powered Red Teaming -- LLM-as-attacker, RL optimization
- Computer Use Agents -- GUI injection
- Embodied AI -- Robotics and physical AI
- All Expert Labs -- Quantization, reward hacking, watermark removal
Which learning path is most appropriate for a penetration tester who has completed the foundational AI security content?
Related Topics
- AI Red Teaming Cheat Sheet - Quick reference for red team engagements
- Career Guide - Building a career in AI red teaming
- Getting Started Labs - Hands-on beginner exercises
- Framework Mapping Reference - Cross-framework compliance mapping
- Tool Comparison Matrix - Choosing the right red team tools
References
- "AI Red Teaming: Best Practices and Lessons Learned" - Microsoft (2024) - Industry guidance on building red team skills
- OWASP AI Security and Privacy Guide - OWASP (2024) - Foundation for understanding AI security domains
- "Anthropic's Responsible Scaling Policy" - Anthropic (2023) - Framework for understanding AI safety evaluation levels
- NIST AI 600-1 - NIST (2024) - AI risk management profiles for generative AI