Instructor Led Training

AI Agent Security Masterclass

Every prompt, plugin, and tool is an attack surface. This training gives you the skills to control them before they become a liability.

Course Overview

2 days
100% Hands-On
Includes Labs, MCP, and RAG Security
Ideal for: AppSec / DevSecOps Engineers

AI agents call tools, move data across systems, and make decisions inside your workflows. That creates new attack paths: prompt injection, tool abuse, data leakage, and unintended execution that traditional security controls don’t fully address.

In this hands-on course, you’ll break real agents, map those risks to the OWASP LLM Top 10, and fix them with tested defenses like sandboxing, least privilege, input controls, and secure tool integrations. By the end, you’ll have a structured, repeatable way to secure agent-driven systems.

You use the OWASP LLM Top 10 to structure, prioritize, and communicate risks across agent-driven systems.

Know your trainer

Abhay Bhargav

CHief RESEARCH OFFICER, AppSecEngineer
Abhay started his career as a breaker of apps, in pentesting and red-teaming, but today is more involved in scaling AppSec with Cloud-Native Security and DevSecOps.

He has created some pioneering works in the area of DevSecOps and AppSec Automation, including the world’s first hands-on training program on DevSecOps, focused on Application Security Automation. In addition to this, Abhay is active in his research of new technologies and their impact on Application Security, specifically Cloud-Native Security. In addition, Abhay has contributed to pioneering work in the Vulnerability Management space, being the architect of a leading Vulnerability Management and Correlation Product, Orchestron.

Abhay is also committed to Open-Source and has developed the first-ever Threat Modeling solution at the crossroads of Agile and DevSecOps, called ThreatPlaybook.Abhay is a speaker and trainer at major industry events including DEF CON, BlackHat, OWASP AppSecUSA, EU and AppSecCali. His training programs have been sold-out events at conferences like AppSecUSA, EU, AppSecDay Melbourne, CodeBlue (Japan), BlackHat USA, SHACK and so on. He's authored two international publications on Java Security and PCI Compliance as well.
Read More
Abhay started his career as a breaker of apps, in pentesting and red-teaming, but today is more involved in scaling AppSec with Cloud-Native Security and DevSecOps.

He has created some pioneering works in the area of DevSecOps and AppSec Automation, including the world’s first hands-on training program on DevSecOps, focused on Application Security Automation. In addition to this, Abhay is active in his research of new technologies and their impact on Application Security, specifically Cloud-Native Security. In addition, Abhay has contributed to pioneering work in the Vulnerability Management space, being the architect of a leading Vulnerability Management and Correlation Product, Orchestron.

Abhay is also committed to Open-Source and has developed the first-ever Threat Modeling solution at the crossroads of Agile and DevSecOps, called ThreatPlaybook.Abhay is a speaker and trainer at major industry events including DEF CON, BlackHat, OWASP AppSecUSA, EU and AppSecCali. His training programs have been sold-out events at conferences like AppSecUSA, EU, AppSecDay Melbourne, CodeBlue (Japan), BlackHat USA, SHACK and so on. He's authored two international publications on Java Security and PCI Compliance as well.
Read less

Big Wins For Your Enterprise

Standardize security across development, operations, and cloud environments.

Run security checks continuously across CI/CD pipelines instead of one-off scans.

Catch vulnerable dependencies and misconfigurations before they reach production.

Deploy and manage containers with consistent security controls at scale.

Train your AppSec and DevSecOps teams hands-on, with live labs mapped to real risks.

What Your Team Will Learn

Build CI/CD pipelines that enforce security controls automatically.

Use DAST, SAST, and SCA in workflows that reduce noise and surface real risk.

Apply threat modeling to prioritize risks using structured approaches like the OWASP Top 10.

Create automation scripts to continuously test and validate application security.

Learn with Real-World Security Scenarios

Work through hands-on labs based on real application and infrastructure risks.

Apply security techniques directly in controlled environments.

Use tooling and workflows that mirror production systems.

Test, break, and fix issues without impacting real environments.

Explore Hands on Labs

Prerequisites

Knowledge base

  • Foundational understanding of application security principles and DevSecOps processes.

  • Familiarity with threat modeling concepts, common vulnerability types (e.g., OWASP Top 10 for Web), and security testing (SAST/DAST/SCA) is beneficial.

  • Basic knowledge of Python programming or scripting is recommended as labs involve reading/writing simple Python code for AI API/framework interaction.

  • An eagerness to experiment, a builder's mindset, and an interest in both offensive and defensive security are key.

What Students Should Bring

  • A laptop with a modern web browser and reliable internet connectivity.

  • All participants will receive access to a cloud-based lab environment with all required tools, LLMs, and agent frameworks. No special hardware or local software installations are needed.

Talk to us

Training Delivered at Global Security Conferences

Our instructor-led training is delivered at leading security conferences, where teams work through real-world scenarios, test modern systems, and apply practical defenses.

The same hands-on approach is used across all our training: focused on real workflows, real risks, and techniques that hold up in production environments.

Blackhat Logo
Code Blue Logo
Troopers Logo
Hackevent Logo
Defcon Logo

Testimonials

I found these courses to be pretty comprehensive and practically oriented. From dissecting common threat vectors to writing abuser stories, it had a lot of useful takeaways by the end.

DevOps Engineer at Streaming Services Provider

WORLD'S LARGEST SPORTS EQUIPMENT MANUFACTURER
Threat modeling has always been a bit elusive for my team, but these courses made it all click. The step-by-step breakdown of threat modeling concepts and integrating them into a DevSecOps pipeline gave us some solid, actionable learnings.

Developer at SaaS Company

DEFENSE INDUSTRY
“Threat modeling is seriously underrated compared to other security activities that have more visible impact. Fact of the matter is, if you can anticipate and build around potential threats to your software, that’s going to make a much bigger difference than if you set up a million defenses after the fact. These courses taught me how to do that!”

Head of Product at International Logistics Corporation

CYBERSECURITY OPERATIONS CENTER (CSOC)
4.6

Koushik M.

"Exceptional Hands-On Security Learning Platform"

Varunsainadh K.

"Practical Security Training with Real-World Labs"

Gaël Z.

"A new generation platform showing both attacks and remediations"

Nanak S.

"Best resource to learn for appsec and product security"

Ready to Elevate Your Security Training?

Empower your teams with the skills they need to secure your applications and stay ahead of the curve.
Get Started Now
Copyright AppSecEngineer © 2026
Bootcamp Sale: Save 25% on all bootcamps. Use code ‘SECURITYFIRST25’
X

Not ready for a demo?

Join us for a live product tour - available every Thursday at 8am PT/11 am ET

Schedule a demo

No, I will lose this chance & potential revenue

x
x