This course introduces Cloud Computing security concepts and practice. It starts by providing the essential concepts and principles for cloud landscape and architecture, including design patterns, and practical case studies. Next, this course discusses security approaches for the cloud landscape (i.e., architecture, design patterns, industry standards, regulatory compliance requirements, and management services). Additionally, it presents how to identify and mitigate risks, applying isolation and protection on both physical and logical infrastructures such as network, computers, storage, data protection for OSI layers, end-to-end identity, and access control, monitoring and auditing practices for effective compliance with industry and regulatory mandates. Finally, the course explores security guidelines for cloud computing in International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST), European Network and Information Security Agency (ENISA), and Cloud Security Alliance (CSA).
Undergraduate 132 CRs
John R. Vacca, Cloud Computing Security, CRC Press
content serial | Description |
---|
1 | Introduction to Cloud Computing Security |
2 | Cloud Landscape and Architecture Principles |
3 | Cloud Design Patterns for Security |
4 | Case Studies in Cloud Security and Security Approaches |
5 | Security Approaches for Cloud Architecture |
6 | Design Patterns for Cloud Security |
7 | 7th Week Assessment |
8 | Industry Standards and Regulatory Compliance Requirements for Cloud Security |
9 | Risk Identification and Mitigation in the Cloud |
10 | Isolation and Protection in Cloud Environments |
11 | Data Protection for OSI Layers in Cloud |
12 | 12th Week Assessment |
13 | End-to-End Identity and Access Control |
14 | Cloud Security Monitoring and Auditing |
15 | Security Guidelines from ISO, NIST, ENISA, and CSA for Cloud Computing |
Start your application