Developing Large Language Models for Cyber Applications
12:04:2025
BY Bradley Hartlove

Get an inside look at RAG with our step-by-step tutorial presented by Software Engineer Bradley Hartlove. Learn how to build smarter LLM applications without the complexity.
As a Software Engineer at SealingTech, I know firsthand that training large language models (LLMs) can be expensive, not to mention overwhelming with the countless libraries, guides, and resources that are out there. It’s why I created a two-part video series featuring 4 tutorials designed to help fellow engineers in the cyber community get up and running on building generative AI applications without dealing with the expense, training, or research.
If you missed the first two tutorials: Introduction to Building LLM Applications and Inference Engines and Prompting Techniques:
In this next part, we’re going to dive into retrieval augmented generation (RAG) as a method that allows you to inject new knowledge into your model without having to formally undergo training or extensive research. And in the final tutorial, we’ll get into the nuts and bolts of building actual LLM agents.
Let’s continue on to the next two video tutorials.
RAG from Scratch
In this video, you’ll explore:
- Overview of Embeddings
- How to Ingest Documents
- Building a simple RAG pipeline
Building LLM Agents
In this video, you’ll learn:
- Defining Agent Tools
- Building an Agentic Loop
I hope you found these tutorials helpful in gaining a foundational understanding of what LLMs are and how to successfully implement them into your applications.
Interested in continuing the conversation? Follow us on Instagram, Facebook, X, and LinkedIn. To see more of SealingTech’s helpful videos, subscribe to our YouTube Channel.
Related Articles
Challenges and Tradeoffs of Zero Trust Architecture in High Performance Computing
Challenges exist when faced with implementing Zero Trust Architecture (ZTA) in High Performance Computing (HPC) enclaves. Although there are benefits to implementing the ZTA, we need to acknowledge what ZTA…
Building Large Language Models in the Cyber Domain
At SealingTech, we’re always looking for ways to share our knowledge and expertise with our customers and the cybersecurity community. As a Software Engineer at SealingTech, I help develop new…
Why the DoD and Commercial Entities Continue to Seek SealingTech Innovation
Developing just another defensive cyber solution has never been enough for us. We solve the hurdles that plague our customers; solutions that get noticed, get adopted, and advance the mission….
Could your news use a jolt?
Find out what’s happening across the cyber landscape every month with The Lightning Report.
Be privy to the latest trends and evolutions, along with strategies to safeguard your government agency or enterprise from cyber threats. Subscribe now.


