Developing Large Language Models for Cyber Applications

12:04:2025

BY Bradley Hartlove

Get an inside look at RAG with our step-by-step tutorial presented by Software Engineer Bradley Hartlove. Learn how to build smarter LLM applications without the complexity.

As a Software Engineer at SealingTech, I know firsthand that training large language models (LLMs) can be expensive, not to mention overwhelming with the countless libraries, guides, and resources that are out there. It’s why I created a two-part video series featuring 4 tutorials designed to help fellow engineers in the cyber community get up and running on building generative AI applications without dealing with the expense, training, or research.

If you missed the first two tutorials: Introduction to Building LLM Applications and Inference Engines and Prompting Techniques:

In this next part, we’re going to dive into retrieval augmented generation (RAG) as a method that allows you to inject new knowledge into your model without having to formally undergo training or extensive research. And in the final tutorial, we’ll get into the nuts and bolts of building actual LLM agents.

Let’s continue on to the next two video tutorials.

RAG from Scratch

In this video, you’ll explore:

  • Overview of Embeddings
  • How to Ingest Documents
  • Building a simple RAG pipeline

Building LLM Agents

In this video, you’ll learn:

  • Defining Agent Tools
  • Building an Agentic Loop

I hope you found these tutorials helpful in gaining a foundational understanding of what LLMs are and how to successfully implement them into your applications.

Interested in continuing the conversation? Follow us on Instagram, Facebook, X, and LinkedIn. To see more of SealingTech’s helpful videos, subscribe to our YouTube Channel.

Related Articles

Challenges and Tradeoffs of Zero Trust Architecture in High Performance Computing

Challenges exist when faced with implementing Zero Trust Architecture (ZTA) in High Performance Computing (HPC) enclaves. Although there are benefits to implementing the ZTA, we need to acknowledge what ZTA…

Learn More

Building Large Language Models in the Cyber Domain

At SealingTech, we’re always looking for ways to share our knowledge and expertise with our customers and the cybersecurity community. As a Software Engineer at SealingTech, I help develop new…

Learn More

Why the DoD and Commercial Entities Continue to Seek SealingTech Innovation

Developing just another defensive cyber solution has never been enough for us. We solve the hurdles that plague our customers; solutions that get noticed, get adopted, and advance the mission….

Learn More

Could your news use a jolt?

Find out what’s happening across the cyber landscape every month with The Lightning Report. 

Be privy to the latest trends and evolutions, along with strategies to safeguard your government agency or enterprise from cyber threats. Subscribe now.