As cloud technologies, artificial intelligence, and the Internet of Things (IoT) continue to evolve, securing these digital platforms becomes a critical priority. This course offers practical guidance for protecting data, applications, and devices, helping IT departments and innovators build a secure infrastructure for the future.
Course Overview Table
Chapter | Details |
Partner | Military Academy „General Mihailo Apostolski “, Skopje |
Title | Security of Emerging Technologies |
Service | Cybersecurity |
Target Group | IT Departments, CTOs, Innovators |
Format | In-Person Training |
Focused on Key Technologies | Cloud Security, AI Security, IoT Security |
Status | Ready to offer |
Stakeholders from SME/PA Side | IT specialists, CTOs, Innovation teams |
Requirements for Participation | Basic knowledge of IT infrastructure and networking |
Estimated Duration | No prior technical knowledge |
Description of the Course
Introduction
While emerging technologies bring significant opportunities, they also introduce new security risks. Whether it’s securing cloud-based applications, managing risks associated with AI systems, or protecting smart devices in IoT ecosystems, a modern approach to cybersecurity is crucial.
Technical Context and Examples
Through real-world examples and scenarios, participants will explore:
- How poorly configured cloud environments can lead to data breaches
- How AI systems can be manipulated via adversarial attacks
- How compromised IoT devices can be exploited to attack internal networks
The course provides practical tools, risk assessment models, and security practices tailored for securing modern digital ecosystems.
Detailed Explanation of Core Concepts
The course focuses on three key domains:
- IoT Security: Understanding security challenges in connected devices, risks from weak firmware and communication protocols, and strategies for securing IoT environments.
- Artificial Intelligence and Cyber Threats: Identifying risks related to AI data processing, adversarial machine learning, deepfakes, and risks from autonomous systems.
- Cloud Security: Core principles for protecting data and applications in cloud platforms (AWS, Azure, GCP), implementing DevSecOps practices, and aligning with compliance standards like GDPR and ISO 27001.
The program includes theoretical sessions, lab exercises, and real-world case analyses to ensure hands-on application of the knowledge gained.
Tentative agenda of the course
Module 1: Introduction to Emerging Technologies Security
- Overview of security challenges in Cloud, AI, and IoT
- Evolution of attacks targeting emerging technologies
Module 2: Internet of Things (IoT) Security
- Common vulnerabilities and attacks in IoT
- Best practices for protecting IoT devices and networks
- Real-world examples of IoT incidents
Module 3: Artificial Intelligence and Cyber Threats
- Security risks in machine learning and automation
- Introduction to adversarial machine learning
- Prevention strategies against misuse of AI systems
Module 4: Cloud Data and Application Protection
- Cloud security principles
- Best practices for securing cloud applications
Module 5: Practical Exercises and Simulations
- Identifying and mitigating IoT security risks
- Analyzing an AI-related cybersecurity incident
- Configuring basic cloud security settings
Module 6: Strategies for Enhancing Emerging Technology Security
- Applying DevSecOps practices
- Continuous monitoring and incident response
- Implementing compliance and standardization policies
Module 7: Final Exam and Feedback Session
- Practical knowledge test
- Recap of key points and feedback
- Strategies for continuous cybersecurity improvement
Conclusion and Unique Value
Upon completion, participants will possess the necessary skills to assess risks, implement security measures, and enhance their organization’s resilience against cyber threats associated with Cloud, AI, and IoT. The combination of theory, practical exercises, and real-world case analysis ensures participants can apply security practices proactively and strategically in emerging digital environments.
Additional Course Information
Category | Details |
Developed skills | Participants will acquire knowledge and skills, including: |
• Identifying vulnerabilities in IoT, AI, and Cloud systems
• Applying security policies and standards • Understanding cloud shared responsibility models • Preventing the misuse of emerging technologies |
|
Learning Methods Used | • Lectures and theoretical lessons
• Hands-on labs and practical simulations • Group discussions and interactive scenarios |
References/Resources | • NIST Guidelines for IoT Security
• ENISA Recommendations on AI Security • Cloud Security Alliance (CSA) Resources |
Overview Slides | / |