Security Engineer Path
Security professionals and engineers
Deep dive into securing AI applications with advanced guardrails, comprehensive red teaming, and threat monitoring. This path covers detector configurations, attack methodologies, and production security patterns.
Lessons in This Path
Getting Started(2 lessons)
Platform Overview & Navigation
Learn how to navigate the Enkrypt AI dashboard and understand each section
Editing Policy Rules
Fine-tune extracted rules, add custom rules, and optimize policy enforcement
Guardrails(9 lessons)
Injection Attack Detector
Learn how to protect your AI from malicious prompts, jailbreaks, and instruction overrides
PII Detector and Redaction
Detect and redact sensitive personal data including PII, secrets, and IP addresses
Policy Violation Detector
Enforce compliance by checking content against your uploaded policy documents
Anti Hallucination Detectors (adherence and relevancy)
Ensure AI responses are accurate, grounded, and relevant using Hallucination, Adherence, and Relevancy detectors
Advanced Policy Patterns
Learn how to write effective policy rules and industry-specific examples
Monitoring Best Practices
Effective strategies for monitoring guardrails and maintaining secure AI systems
RAG Workflow Integration
Apply guardrails at three critical points in Retrieval-Augmented Generation pipelines
Analyzing Guardrail Results
Parse, analyze, and generate reports from guardrail detection results
Understanding Guardrails Performance
Learn how to measure and optimize guardrail performance metrics
Red Teaming(6 lessons)
Configuring Test Types
Learn which security tests to run and when to use them
Configuring Attack Methods
Select attack techniques to simulate real-world threats
Custom Tests and Datasets
Create domain-specific tests tailored to your use case
Phased Red Teaming Approach
Learn a structured crawl-walk-run approach to red teaming
Understanding Red Team Results and Reports
Learn how to interpret red team test results and use them to improve security
Run Guardrails Through Red Teaming Results
Evaluate guardrail effectiveness by testing them against red team attack results
MCP Security(8 lessons)
Introduction to MCP Security
Understand why MCP security matters and the threats facing MCP infrastructure
Understanding the MCP Hub
Learn how to use the MCP Hub to evaluate server security before adoption
Scanning MCP Servers
Use the MCP Scanner to detect vulnerabilities in your MCP servers
Installing the Secure MCP Gateway
Install and set up the Secure MCP Gateway to protect your MCP infrastructure
Configuring the Gateway
Configure MCP servers, guardrails, and security policies in the gateway
Using Guardrails with MCP Gateway
Implement input and output guardrails to protect against attacks
Monitoring and Auditing
Monitor gateway activity, view logs, and maintain audit trails for compliance
MCP Security Best Practices
Follow security best practices for deploying and managing MCP infrastructure
What You'll Learn
- Implement advanced guardrail configurations
- Conduct comprehensive red team assessments
- Configure security and privacy detectors
- Analyze and remediate AI vulnerabilities
- Design secure RAG and agent workflows
Complete to earn
Security Expert
