IA Technologies for Cybersecurity and IoT (1ed.2024) UNED, S.M.E. INSTITUTO NACIONAL DE CIBERSEGURIDAD DE ESPAÑA M.P., S.A.

El equipo docente ha activado 100 certificados con un descuento del 100% para los 100 primeros alumnos que lo soliciten.
Desde su página de progreso o desde su panel de control podrán actualizar a verificado e introduciendo el código IACIBER001 podrán tener un descuento del 100% del certificado, el cual solo se emitirá cuando superen el curso.
Esta oferta estará disponible hasta que finalicen los 100 cupones.
The Internet of Things (IoT) is a network of physical devices, vehicles, buildings and other objects connected to the Internet that collect and share data. IoT has the potential to transform many aspects of our lives, from the way we live and work to the way we relate to the world around us. Especially in the rural environment, where it is one of the main approaches to digitization and a lever for change. However, it also presents significant security challenges.
IoT devices often have limited resources, which makes them vulnerable to attacks. Especially in rural environments, where these limitations are increased. In addition, IoT devices are often connected to open networks, making it easy for attackers to access them. As a result, IoT devices are an attractive target for cybercriminals.
In recent years, there have been significant advances in IoT cybersecurity. These improvements have focused on the development of new technologies and solutions that can help protect IoT devices from attacks.
One of the most prominent trends in IoT cybersecurity is the use of artificial intelligence (AI). AI can be used to detect and respond to attacks against IoT devices more effectively than traditional techniques. For example, AI can be used to analyze IoT device data for suspicious patterns, or to generate alerts if attacks are detected.
Another important trend in IoT cybersecurity is the development of new security architectures. These architectures are designed to improve the security of IoT devices by design. For example, some security architectures include self-healing mechanisms that can repair IoT devices that have been infected by malware.
These advances in IoT cybersecurity are helping to protect IoT devices from attacks. However, it is important to continue to research and develop new technologies and solutions to keep IoT devices secure in the future.
IoT cybersecurity is a complex field that requires a thorough understanding of the technologies and threats. This course aims to provide a broad foundation of IoT cybersecurity technologies and specific AI-based solutions.
Teaching Staff
Course coordination
- Mª Llanos Tobarra Abad. ETSI Informática, Sistemas de Comunicación y Control.
- Rafael Pastor Vargas. ETSI Informática, Sistemas de Comunicación y Control.
Teaching Staff
- Mª Llanos Tobarra Abad. ETSI Informática, Sistemas de Comunicación y Control.
- Rafael Pastor Vargas. ETSI Informática, Sistemas de Comunicación y Control.
- Antonio Robles Gómez. ETSI Informática, Sistemas de Comunicación y Control.
- Agustín C. Caminero Herráez. ETSI Informática, Sistemas de Comunicación y Control.
- Miguel Romero Hortelano. ETSI Informática, Sistemas de Comunicación y Control.
- Elio San Cristobal. ETSII Ingeniera Eléctrica, Electrónica y de Control Por la Escuela Superior de Ingenieros Industriales .
- Roberto Hernández Berlinches. ETSI Informática, Sistemas de Comunicación y Control.
- Esteban Corral González. INTECCA, CA Ponferrada
- Pedro Vidal Balboa. INTECCA, CA Ponferrada
- Ricardo Jardim-Gonçalves. NOVA
- João Sarraipa. NOVA
Objectives
Upon completion of this course, students will be able to:- Understand the basic concepts of IoT cybersecurity.
- Identify the security risks associated with IoT devices.
- Apply IoT security best practices.
- Deployment of AI-based IoT security solutions.
Área de Conocimiento
Informática e Ingeniería
Agenda
- Module 1: Technological foundations for IoT systems. This module provides the basic concepts necessary to understand the operation of IoT technology from its different facets. It provides the basis for understanding the following modules of the course. Special attention will be given to IoT systems deployed in the rural environment.
- Module 2: Fundamentals of IoT cybersecurity. This module provides an introduction to the basics of IoT cybersecurity. Students will learn about the basic principles of cybersecurity, the security risks associated with IoT devices (especially when deployed in rural environments) and security best practices.
- Module 3: Threats and vulnerabilities in IoT. This module analyzes the specific threats and vulnerabilities associated with IoT devices. Students will learn about the different types of attacks that can be targeted at IoT devices, as well as the vulnerabilities that can be exploited by attackers.
- Module 4: AI-based security solutions. This module explores AI-based security solutions that can be used in conjunction with IoT devices, especially from a protection perspective. Students will learn about the different types of AI solutions that can be used to detect and respond to attacks against IoT devices.
Evaluation System
The course consists of 4 self-assessment test-type exercises with a weighting of 100% of the final mark. The user must pass 50% of the course in order to obtain accreditation. The evaluation exercises are translated into English and Spanish.
In IEDRA's FAQs you will find information on how to process the accreditations, types, content, returns, etc.
UNED Abierta recommends that you register for the course as a listener and process the accreditation once you have passed the course.
El curso se compone de 4 ejercicios de autoevaluación tipo test con un peso del 100% de la calificación final. El usuario deberá superar el 50% del curso para poder tramitar la acreditación.
En las FAQs de IEDRA dispone de la información sobre el trámite de las acreditaciones, tipología, contenido, devoluciones, etc.
Desde UNED Abierta recomendamos inscribirse en el curso como oyente y tramitar la acreditación una vez superado el curso.
Access requirements
- No specific access qualification is required but some basic knowledge of computer science and networks. Since the course is taught entirely in English, an appropriate level of English is required.
- No se requiere titulación específica de acceso, pero si ciertos conocimientos base sobre informática y redes informáticas. Dado que el curso de imparte por completo en inglés, se exige un nivel apropiado de inglés.
Audicence
- Todas aquellas personas que quieran aprender sobre ciberseguridad en entornos IoT y el uso de la Inteligencia Artificial aplicada a la ciberseguridad en dicho contexto.
- All those who want to learn about cybersecurity in IoT environments and the use of Artificial Intelligence applied to cybersecurity in this context.
Metadata
UNED, IoT, IA, Cibersecurity, Smart devices, Sofware development, IoT Cibersecurity, Computer Science, Industria 4.0