quanterios
Quanterios AcademyAI · Foundations

AI Security Foundations

Understand models, agents, MCP servers, and the AI attack surface.

This course gives technical and governance teams a grounded view of AI systems in production. It explains how models, agents, MCP servers, tools, data, and human oversight fit together, and where the real security and control boundaries live.

Course profile
Duration: 6 hours
Format: Self-paced with guided labs
Video: 3.5 hours of guided lessons
Labs: 2 labs, 2.5 hours
Credential: Certificate of completion
Included
  • AIBOM sample pack
  • Threat-model worksheet
  • Runtime incident walkthrough
  • Foundations assessment
Who this is for
  • Security and risk practitioners new to AI environments
  • Application and platform engineers
  • Compliance teams who need architectural literacy
Prerequisites
  • No prior AI specialization required
  • Helpful to understand APIs, systems integration, and basic data flows
Outcomes

By the end, your team can do the work.

01Distinguish models, agents, MCP servers, tools, and orchestration layers
02Read an AIBOM and explain how the system is assembled
03Identify the major classes of AI security failure from prompt injection to tool abuse
04Map architectural choices to specific control requirements and monitoring needs
Detailed syllabus

3 modules, with lesson-by-lesson structure.

01

Module 1, AI systems in production

Learn the building blocks behind enterprise AI systems and the decisions that shape their risk profile.

Video22 min
Models, retrieval, and orchestration

The baseline architecture patterns behind LLM-powered systems.

Video18 min
Agents and tool invocation

What makes agentic systems powerful and brittle at the same time.

Quiz10 min
Architecture mapping quiz

Test understanding of common deployment shapes.

02

Module 2, MCP and runtime surfaces

Understand why MCP servers and tool boundaries are major control points.

Video20 min
MCP server topology

How MCP expands capability while increasing blast radius if unmanaged.

Reading12 min
Runtime traces and control points

Where policy, identity, and validation need to sit.

Lab50 min
AIBOM analysis lab

Inspect an AI estate and identify control gaps.

03

Module 3, Threat landscape and response basics

Move from architecture to concrete attack paths and security responses.

Video24 min
Prompt injection, exfiltration, and scope abuse

A practical breakdown of the most relevant attack classes.

Video16 min
Baseline control patterns

Input, output, policy, and oversight controls that matter first.

Lab45 min
Threat-model lab

Create an initial defense plan for a sample AI deployment.

Assessment25 min
Foundations assessment

Check readiness for runtime-focused learning.

Labs and assessment
Assessment model
  • Architecture comprehension quizzes
  • AIBOM walkthrough lab
  • Final knowledge check
Tools and artifacts
  • AIBOM examples
  • Threat model canvas
  • Runtime trace examples
Enterprise fit
Certificate of completion

A strong onboarding program for AI governance, application security, and platform teams adopting Quanterios AI or reviewing high-risk AI systems.

Move from interest to enrollment.

Recommended next steps after this course include ai-runtime, ai-compliance.