Skip to main content
Back to all modules

Data Poisoning

Data Poisoning icon

Discover how attackers corrupt the data AI systems rely on, from RAG pipelines to training sets.

This module descends into the deepest layer of AI security: the data. Learners explore risks specific to Retrieval-Augmented Generation (RAG) systems, attacks targeting ingestion pipelines and embeddings, and how private data can be exposed through retrieval or embedding leakage. Mapped to OWASP LLM02, LLM04, and LLM08, the module closes with two scenario-based challenges centred on RAG poisoning detection and defence.

Data Poisoning icon

We use cookies to ensure you get the best user experience. For more information see our cookie policy.