This video is still being processed. Please check back later and refresh the page.

Uh oh! Something went wrong, please try again.

Securing the AI/ML Supply Chain

Love developing AI/ML, but don't want to become the next front-page cyberattack? This course is for you!

rate limit

Code not recognized.

About this course

This course teaches the fundamentals of software supply chain security for AI/ML systems, a significant component of Machine Learning Security Operations (MLSecOps). It is designed for anyone who wants to understand the why and how of securing the AI/ML supply chain, including data scientists, machine learning engineers, AI researchers, and other software or security professionals who encounter these technologies on the job.

Participants will practice hands-on exercises on tools and methods for safeguarding AI/ML systems throughout their lifecycle, and ensuring the transparency, authenticity, and integrity of the software components used in AI/ML development. They will also learn key supply chain security topics, such as the threat landscape of AI/ML systems, attack surfaces in the AI/ML development lifecycle, and standards, regulations, and governing bodies that are actively shaping cybersecurity practices in this domain. Participants who complete the course will earn a Credly badge, and have the skills to start securing AI/ML supply chains in their organization. 

If you have any questions or comments, feel free to reach out at courses@chainguard.dev. 

Course Details
  • Developers; Software Professionals

  • 3-5h

  • 18 Lessons

DUMMY TEXT DO NOT EDIT PLZ

Curriculum

  • AI/ML: A Vulnerability Goldmine?
  • Part I
  • Foundations of AI/ML Supply Chain Security
  • Module 1
  • Overview of AI/ML Supply Chains
  • Inventorying the AI/ML Supply Chain
  • Looking Ahead
  • Test Your Knowledge!
  • Module 2
  • The Threat Landscape of AI/ML Systems
  • Cyberattackers: Motivations and Backgrounds
  • Types of Cyberattacks on AI/ML Systems
  • Data-Based Attacks
  • Model-based Attacks
  • Infrastructure-Based Attacks
  • Operational Attacks
  • Looking Ahead
  • Test Your Knowledge!
  • Module 3
  • Global Governance of AI/ML
  • Global Regulation
  • Looking Ahead
  • Test Your Knowledge!
  • Module 4
  • Standards and Guidelines for Securing AI/ML Systems
  • The Role of Standards and Controls in Cybersecurity
  • Issuing Bodies
  • Other Frameworks and Guidelines
  • Looking Ahead
  • Test Your Knowledge!
  • Part II
  • Practical Strategies for Securing AI/ML Supply Chains: Implementation and Management
  • Module 5
  • Detecting and Remediating Known Vulnerabilities
  • The Toil of Vulnerability Management
  • Hands-on #1: Scanning for CVEs
  • AI and Vulnerability Management in 2024
  • Hands-on #2: Attack Surface in AI Production Images
  • Chainguard Images for AI
  • Hands-On #3: Working with the PyTorch-CUDA12 Chainguard Image
  • Looking Ahead
  • Test Your Knowledge!
  • Module 6
  • AI/ML Supply Chain Transparency
  • Software Bills of Materials (SBOMs)
  • Hands-On #1: Creating and Scanning SBOMs
  • AI/ML Bills of Materials (AI/MLBOMs)
  • Model Cards
  • Model Scanning
  • Looking Ahead
  • Test Your Knowledge!
  • Module 7
  • Integrity and Authenticity Verification
  • Digital Signing With Sigstore
  • Hands-On #1: How to use Cosign to Sign and Verify Software Artifacts
  • Hands-On #2: Using Cosign to Verify Container and Attestation Signatures
  • Provenance Tracking
  • Supply Chain Levels for Software Artifacts (SLSA)
  • Hands-On #3: Interpreting Provenance Metadata
  • Looking Ahead
  • Test Your Knowledge!
  • Conclusion
  • Congratulations!
  • Feedback and Support
  • How to Get Your Badge and Certificate
  • Please take our short survey
  • Contact Us

About this course

This course teaches the fundamentals of software supply chain security for AI/ML systems, a significant component of Machine Learning Security Operations (MLSecOps). It is designed for anyone who wants to understand the why and how of securing the AI/ML supply chain, including data scientists, machine learning engineers, AI researchers, and other software or security professionals who encounter these technologies on the job.

Participants will practice hands-on exercises on tools and methods for safeguarding AI/ML systems throughout their lifecycle, and ensuring the transparency, authenticity, and integrity of the software components used in AI/ML development. They will also learn key supply chain security topics, such as the threat landscape of AI/ML systems, attack surfaces in the AI/ML development lifecycle, and standards, regulations, and governing bodies that are actively shaping cybersecurity practices in this domain. Participants who complete the course will earn a Credly badge, and have the skills to start securing AI/ML supply chains in their organization. 

If you have any questions or comments, feel free to reach out at courses@chainguard.dev. 

Course Details
  • Developers; Software Professionals

  • 3-5h

  • 18 Lessons

DUMMY TEXT DO NOT EDIT PLZ

Curriculum

  • AI/ML: A Vulnerability Goldmine?
  • Part I
  • Foundations of AI/ML Supply Chain Security
  • Module 1
  • Overview of AI/ML Supply Chains
  • Inventorying the AI/ML Supply Chain
  • Looking Ahead
  • Test Your Knowledge!
  • Module 2
  • The Threat Landscape of AI/ML Systems
  • Cyberattackers: Motivations and Backgrounds
  • Types of Cyberattacks on AI/ML Systems
  • Data-Based Attacks
  • Model-based Attacks
  • Infrastructure-Based Attacks
  • Operational Attacks
  • Looking Ahead
  • Test Your Knowledge!
  • Module 3
  • Global Governance of AI/ML
  • Global Regulation
  • Looking Ahead
  • Test Your Knowledge!
  • Module 4
  • Standards and Guidelines for Securing AI/ML Systems
  • The Role of Standards and Controls in Cybersecurity
  • Issuing Bodies
  • Other Frameworks and Guidelines
  • Looking Ahead
  • Test Your Knowledge!
  • Part II
  • Practical Strategies for Securing AI/ML Supply Chains: Implementation and Management
  • Module 5
  • Detecting and Remediating Known Vulnerabilities
  • The Toil of Vulnerability Management
  • Hands-on #1: Scanning for CVEs
  • AI and Vulnerability Management in 2024
  • Hands-on #2: Attack Surface in AI Production Images
  • Chainguard Images for AI
  • Hands-On #3: Working with the PyTorch-CUDA12 Chainguard Image
  • Looking Ahead
  • Test Your Knowledge!
  • Module 6
  • AI/ML Supply Chain Transparency
  • Software Bills of Materials (SBOMs)
  • Hands-On #1: Creating and Scanning SBOMs
  • AI/ML Bills of Materials (AI/MLBOMs)
  • Model Cards
  • Model Scanning
  • Looking Ahead
  • Test Your Knowledge!
  • Module 7
  • Integrity and Authenticity Verification
  • Digital Signing With Sigstore
  • Hands-On #1: How to use Cosign to Sign and Verify Software Artifacts
  • Hands-On #2: Using Cosign to Verify Container and Attestation Signatures
  • Provenance Tracking
  • Supply Chain Levels for Software Artifacts (SLSA)
  • Hands-On #3: Interpreting Provenance Metadata
  • Looking Ahead
  • Test Your Knowledge!
  • Conclusion
  • Congratulations!
  • Feedback and Support
  • How to Get Your Badge and Certificate
  • Please take our short survey
  • Contact Us
Course

Learn the tools and fundamentals of vulnerability management and why it's critical that every developer understand it.

Course

Learn the tools and fundamentals of vulnerability management and why it's critical that every developer understand it.