FI2AMCS75 Cloud Security
FI2AMCS75 Cloud Security
- Course description
- Course CodeFI2AMCS75
- Level of Study5.2
- Program of StudyNetwork and IT Security
- Credits7.5
- Study Plan CoordinatorBenjamin Rosenlund
The course provides knowledge of securing cloud computing and hybrid environments and skills to configure solutions based on project specifications. Cloud computing is renting resources, like storage space or CPU cycles instead of running the resources on their own equipment and securing these kinds of services are different compared to on-premises systems. The course is based on Microsoft Azure; however, the theory, concepts and terminology are standard among the major vendors, and the principles and elements of securing cloud and hybrid environments will be similar regardless of vendor.
The aim of the course is to provide fundamental competence to secure cloud services. The demand for increased performance, storage requirements increase, and the lines between on-premises computing versus cloud computing become more diffuse. Therefore, many businesses are currently moving fast towards cloud computing and the need for competent personnel to secure these services is also increasing. The course is also a logical follow-up to the Cloud Computing Foundations course in the second semester (and the Network and Systems Administration program), and the previous course – CyberOps.
The candidate:
- has knowledge of security, compliance, and identity concepts in cloud computing.
- can assess their own work in relation to securing networks in cloud and hybrid environments as a part of an end-to-end infrastructure.
- is familiar with the history, tradition, and distinctive nature of cloud computing and understands the necessity of securing cloud data.
- has insight into their own opportunities for development within topics related to cloud security elements.
The candidate:
- can explain their actions and choices in securing networks, virtual hosts, and cloud applications.
- can reflect over their vocational practice in security operations and adjust it under supervision.
- can find and refer to information and vocational material concerning security in cloud environments and assess its relevance in an overall ICT security strategy.
The candidate:
- can plan and carry out virtual machine host security and resource management projects alone or part of a group and per ethical requirements and principles in cloud computing.
- can contribute to organisational development within secure cloud and hybrid environments.
Digital Learning Resources
The learning management system (LMS) is the primary learning platform where students access most of their course materials. The content is presented in various formats, such as text, images, models, videos or podcasts. Each course follows a progression plan, designed to lead students through weekly modules at their own pace. Exercises and assignments (individual or in groups) are embedded throughout the courses to support continuous practice and assessment of the learning outcomes.
Campus Resources
In addition to the digital learning resources, campus students participate in physical learning activities led by teachers as part of the overall delivery.
Guidance
Guidance and feedback from teachers support students' learning journeys, and may be provided synchronously or asynchronously, individually or in groups, via text, video or in-person feedback.
Eksamensform | Karakterskala | Gruppering | Varighet |
---|---|---|---|
Course Assignment | Grade A-F | Individual | 5 Hour(s) |