Description
AI system hacking methodology, AI recon and attack surface mapping, vuln scanning and fuzzing, prompt injection and LLM attacks, adversarial ML, data poisoning, agentic AI attacks, AI infra/supply‑chain attacks, AI security testing, IR and forensics.



