FI2AMCS75 Cloud Security

FI2AMCS75 Cloud Security

  • Course description
    • Course Code
      FI2AMCS75
    • Level of Study
      5.2
    • Program of Study
      Network and IT Security
    • Credits
      7.5
    • Study Plan Coordinator
      Benjamin Rosenlund
Teaching Term(s)
2025 Autumn
About the Course

The course provides knowledge of securing cloud computing and hybrid environments and skills to configure solutions based on project specifications. Cloud computing is renting resources, like storage space or CPU cycles instead of running the resources on their own equipment and securing these kinds of services are different compared to on-premises systems. The course is based on Microsoft Azure; however, the theory, concepts and terminology are standard among the major vendors, and the principles and elements of securing cloud and hybrid environments will be similar regardless of vendor. 

The aim of the course is to provide fundamental competence to secure cloud services. The demand for increased performance, storage requirements increase, and the lines between on-premises computing versus cloud computing become more diffuse. Therefore, many businesses are currently moving fast towards cloud computing and the need for competent personnel to secure these services is also increasing. The course is also a logical follow-up to the Cloud Computing Foundations course in the second semester (and the Network and Systems Administration program), and the previous course – CyberOps. 

Course Learning Outcomes
Knowledge

The candidate: 

  • has knowledge of security, compliance, and identity concepts in cloud computing. 
  • can assess their own work in relation to securing networks in cloud and hybrid environments as a part of an end-to-end infrastructure. 
  • is familiar with the history, tradition, and distinctive nature of cloud computing and understands the necessity of securing cloud data. 
  • has insight into their own opportunities for development within topics related to cloud security elements. 
Skills

The candidate: 

  • can explain their actions and choices in securing networks, virtual hosts, and cloud applications. 
  • can reflect over their vocational practice in security operations and adjust it under supervision. 
  • can find and refer to information and vocational material concerning security in cloud environments and assess its relevance in an overall ICT security strategy. 
General Competence

The candidate: 

  • can plan and carry out virtual machine host security and resource management projects alone or part of a group and per ethical requirements and principles in cloud computing. 
  • can contribute to organisational development within secure cloud and hybrid environments. 
Learning Activities

Digital Learning Resources
The learning management system (LMS) is the primary learning platform where students access most of their course materials. The content is presented in various formats, such as text, images, models, videos or podcasts. Each course follows a progression plan, designed to lead students through weekly modules at their own pace. Exercises and assignments (individual or in groups) are embedded throughout the courses to support continuous practice and assessment of the learning outcomes.

Campus Resources
In addition to the digital learning resources, campus students participate in physical learning activities led by teachers as part of the overall delivery.

Guidance
Guidance and feedback from teachers support students' learning journeys, and may be provided synchronously or asynchronously, individually or in groups, via text, video or in-person feedback.

Assessments
EksamensformKarakterskalaGrupperingVarighet
Course Assignment
Grade A-F
Individual
5 Hour(s)
Reading List

Teaching materials, reading lists, and essential resources will be shared in the learning platform and software user manuals where applicable.