Cloud Computing Security

  • Cybersecurity |

Description

This course introduces Cloud Computing security concepts and practice. It starts by providing the essential concepts and principles for cloud landscape and architecture, including design patterns, and practical case studies. Next, this course discusses security approaches for the cloud landscape (i.e., architecture, design patterns, industry standards, regulatory compliance requirements, and management services). Additionally, it presents how to identify and mitigate risks, applying isolation and protection on both physical and logical infrastructures such as network, computers, storage, data protection for OSI layers, end-to-end identity, and access control, monitoring and auditing practices for effective compliance with industry and regulatory mandates. Finally, the course explores security guidelines for cloud computing in International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST), European Network and Information Security Agency (ENISA), and Cloud Security Alliance (CSA).

Program

Undergraduate 132 CRs

Objectives

  • - To provide students with a comprehensive understanding of cloud computing security, covering essential concepts and principles.
    - To equip students with the knowledge and skills to design secure cloud architectures and implement security measures in compliance with industry standards and regulatory requirements.
    - To enable students to identify and mitigate security risks in cloud environments, including isolation and protection of physical and logical infrastructures.
    - To familiarize students with security guidelines and best practices from prominent organizations such as ISO, NIST, ENISA, and CSA in the context of cloud computing

Textbook

John R. Vacca, Cloud Computing Security, CRC Press

Course Content

content serial Description
1Introduction to Cloud Computing Security
2Cloud Landscape and Architecture Principles
3Cloud Design Patterns for Security
4Case Studies in Cloud Security and Security Approaches
5Security Approaches for Cloud Architecture
6Design Patterns for Cloud Security
77th Week Assessment
8Industry Standards and Regulatory Compliance Requirements for Cloud Security
9Risk Identification and Mitigation in the Cloud
10Isolation and Protection in Cloud Environments
11Data Protection for OSI Layers in Cloud
1212th Week Assessment
13End-to-End Identity and Access Control
14Cloud Security Monitoring and Auditing
15Security Guidelines from ISO, NIST, ENISA, and CSA for Cloud Computing

Markets and Career

  • Generation, transmission, distribution and utilization of electrical power for public and private sectors to secure both continuous and emergency demands.
  • Electrical power feeding for civil and military marine and aviation utilities.
  • Electrical works in construction engineering.

Start your application

Start The your journey to your new career.