КОНТАКТ
ул. „Руѓер Бошковиќ“ бр. 18 П. фах 574 – Скопје,
[email protected]
(02) 3099 191 и (02) 3062 224
Back

Security of Emerging Technologies

As cloud technologies, artificial intelligence, and the Internet of Things (IoT) continue to evolve, securing these digital platforms becomes a critical priority. This course offers practical guidance for protecting data, applications, and devices, helping IT departments and innovators build a secure infrastructure for the future.

Course Overview Table
Chapter Details
Partner Military Academy „General Mihailo Apostolski “, Skopje
Title Security of Emerging Technologies
Service Cybersecurity
Target Group IT Departments, CTOs, Innovators
Format In-Person Training
Focused on Key Technologies Cloud Security, AI Security, IoT Security
Status Ready to offer
Stakeholders from SME/PA Side IT specialists, CTOs, Innovation teams
Requirements for Participation Basic knowledge of IT infrastructure and networking
Estimated Duration No prior technical knowledge
Description of the Course

Introduction

While emerging technologies bring significant opportunities, they also introduce new security risks. Whether it’s securing cloud-based applications, managing risks associated with AI systems, or protecting smart devices in IoT ecosystems, a modern approach to cybersecurity is crucial.

Technical Context and Examples

Through real-world examples and scenarios, participants will explore:

  • How poorly configured cloud environments can lead to data breaches
  • How AI systems can be manipulated via adversarial attacks
  • How compromised IoT devices can be exploited to attack internal networks

The course provides practical tools, risk assessment models, and security practices tailored for securing modern digital ecosystems.

 Detailed Explanation of Core Concepts

The course focuses on three key domains:

  • IoT Security: Understanding security challenges in connected devices, risks from weak firmware and communication protocols, and strategies for securing IoT environments.
  • Artificial Intelligence and Cyber Threats: Identifying risks related to AI data processing, adversarial machine learning, deepfakes, and risks from autonomous systems.
  • Cloud Security: Core principles for protecting data and applications in cloud platforms (AWS, Azure, GCP), implementing DevSecOps practices, and aligning with compliance standards like GDPR and ISO 27001.

The program includes theoretical sessions, lab exercises, and real-world case analyses to ensure hands-on application of the knowledge gained.

 Tentative agenda of the course

Module 1: Introduction to Emerging Technologies Security

  • Overview of security challenges in Cloud, AI, and IoT
  • Evolution of attacks targeting emerging technologies

Module 2: Internet of Things (IoT) Security

  • Common vulnerabilities and attacks in IoT
  • Best practices for protecting IoT devices and networks
  • Real-world examples of IoT incidents

Module 3: Artificial Intelligence and Cyber Threats

  • Security risks in machine learning and automation
  • Introduction to adversarial machine learning
  • Prevention strategies against misuse of AI systems

Module 4: Cloud Data and Application Protection

  • Cloud security principles
  • Best practices for securing cloud applications

Module 5: Practical Exercises and Simulations

  • Identifying and mitigating IoT security risks
  • Analyzing an AI-related cybersecurity incident
  • Configuring basic cloud security settings

Module 6: Strategies for Enhancing Emerging Technology Security

  • Applying DevSecOps practices
  • Continuous monitoring and incident response
  • Implementing compliance and standardization policies

 

Module 7: Final Exam and Feedback Session

  • Practical knowledge test
  • Recap of key points and feedback
  • Strategies for continuous cybersecurity improvement
Conclusion and Unique Value

Upon completion, participants will possess the necessary skills to assess risks, implement security measures, and enhance their organization’s resilience against cyber threats associated with Cloud, AI, and IoT. The combination of theory, practical exercises, and real-world case analysis ensures participants can apply security practices proactively and strategically in emerging digital environments.

Additional Course Information
Category Details
Developed skills Participants will acquire knowledge and skills, including:
• Identifying vulnerabilities in IoT, AI, and Cloud systems

• Applying security policies and standards

• Understanding cloud shared responsibility models

• Preventing the misuse of emerging technologies

Learning Methods Used • Lectures and theoretical lessons

• Hands-on labs and practical simulations

• Group discussions and interactive scenarios

References/Resources • NIST Guidelines for IoT Security

• ENISA Recommendations on AI Security

• Cloud Security Alliance (CSA) Resources

Overview Slides /