# practical
標記為「practical」的 48 篇文章
Practical Fine-Tuning Security Assessment
Hands-on assessment of LoRA attacks, alignment removal, and backdoor detection in fine-tuned models.
Practical Incident Response Assessment
Practical assessment simulating an AI security incident with evidence analysis and response procedures.
Skill Verification: Agent Exploitation
Practical skill verification for agent and MCP exploitation techniques.
Skill Verification: Cloud AI Security
Practical verification of cloud AI platform security assessment skills.
Skill Verification: Defense Evaluation
Hands-on verification of ability to evaluate and bypass LLM defense mechanisms.
Skill Verification: Multimodal Attacks
Hands-on verification of multimodal attack capabilities across image, audio, and document modalities.
Skill Verification: Prompt Injection
Hands-on skill verification requiring live exploitation of prompt injection vulnerabilities.
Skill Verification: RAG & Data Attacks
Practical verification of RAG poisoning, embedding attacks, and data extraction techniques.
Skill Verification: Red Team Reporting
Practical assessment of red team report writing and finding communication skills.
Skill Verification: Tool Proficiency
Hands-on verification of proficiency with Garak, PyRIT, Promptfoo, and custom tooling.
Skill Verification: Embedding Attacks
Practical verification of embedding and vector database attack capabilities.
Skill Verification: Fine-Tuning Attacks (Assessment)
Practical verification of fine-tuning attack capabilities including alignment removal and backdoor insertion.
Skill Verification: AI Forensics Investigation
Hands-on verification of AI forensics investigation capabilities with simulated incident scenarios.
Skill Verification: Governance Audit (Assessment)
Practical verification of AI governance audit skills against EU AI Act and NIST AI RMF requirements.
Skill Verification: Guardrail Bypass
Hands-on verification of guardrail bypass techniques across NeMo, LLM Guard, and custom implementations.
Skill Verification: MCP Exploitation (Assessment)
Hands-on verification of MCP server exploitation including tool poisoning and resource manipulation.
Skill Verification: Multi-Agent Testing
Hands-on verification of multi-agent system security testing capabilities.
Skill Verification: Red Team Automation
Practical verification of red team automation skills using Garak, PyRIT, and custom tooling.
Practical Skills Assessment Prep
Preparation guide for hands-on skill verification assessments with practice scenarios.
Practical Membership Inference Attacks
Practical guide to conducting membership inference attacks against deployed language models.
Practical Synthetic Data Poisoning
Poisoning synthetic data generation pipelines used for model training augmentation.
MITRE ATLAS Practical Guide
Practical guide to using MITRE ATLAS for AI threat modeling and attack surface mapping.
Practical Embedding Manipulation
Manipulate text to achieve target embedding similarities for poisoning retrieval augmented generation systems.
Practical Model Fingerprinting Lab
Fingerprint the underlying model behind an API endpoint to identify its type, version, and configuration.
Practical Fine-Tuning 安全 評量
Hands-on assessment of LoRA attacks, alignment removal, and backdoor detection in fine-tuned models.
Practical Incident Response 評量
Practical assessment simulating an AI security incident with evidence analysis and response procedures.
Skill Verification: 代理 利用ation
Practical skill verification for agent and MCP exploitation techniques.
Skill Verification: Cloud AI 安全
Practical verification of cloud AI platform security assessment skills.
Skill Verification: 防禦 Evaluation
Hands-on verification of ability to evaluate and bypass LLM defense mechanisms.
Skill Verification: Multimodal 攻擊s
Hands-on verification of multimodal attack capabilities across image, audio, and document modalities.
Skill Verification: 提示詞注入
Hands-on skill verification requiring live exploitation of prompt injection vulnerabilities.
Skill Verification: RAG & Data 攻擊s
Practical verification of RAG poisoning, embedding attacks, and data extraction techniques.
Skill Verification: 紅隊 Reporting
Practical assessment of red team report writing and finding communication skills.
Skill Verification: 工具 Proficiency
Hands-on verification of proficiency with Garak, PyRIT, Promptfoo, and custom tooling.
Skill Verification: Embedding 攻擊s
Practical verification of embedding and vector database attack capabilities.
Skill Verification: Fine-Tuning 攻擊s (評量)
Practical verification of fine-tuning attack capabilities including alignment removal and backdoor insertion.
Skill Verification: AI Forensics Investigation
Hands-on verification of AI forensics investigation capabilities with simulated incident scenarios.
Skill Verification: Governance Audit (評量)
Practical verification of AI governance audit skills against EU AI Act and NIST AI RMF requirements.
Skill Verification: Guardrail Bypass
Hands-on verification of guardrail bypass techniques across NeMo, LLM Guard, and custom implementations.
Skill Verification: MCP 利用ation (評量)
Hands-on verification of MCP server exploitation including tool poisoning and resource manipulation.
Skill Verification: Multi-代理 Testing
Hands-on verification of multi-agent system security testing capabilities.
Skill Verification: 紅隊 Automation
Practical verification of red team automation skills using Garak, PyRIT, and custom tooling.
Practical Skills 評量 Prep
Preparation guide for hands-on skill verification assessments with practice scenarios.
Practical Membership Inference 攻擊s
Practical guide to conducting membership inference attacks against deployed language models.
Practical Synthetic Data 投毒
投毒 synthetic data generation pipelines used for model training augmentation.
MITRE ATLAS Practical 指南
Practical guide to using MITRE ATLAS for AI threat modeling and attack surface mapping.
Practical Embedding Manipulation
Manipulate text to achieve target embedding similarities for poisoning retrieval augmented generation systems.
Practical 模型 Fingerprinting 實驗室
Fingerprint the underlying model behind an API endpoint to identify its type, version, and configuration.