FI2AMCS75 Cloud Security
FI2AMCS75 Cloud Security
- Course description
- Course codeFI2AMCS75
- Level of study5.2
- Program of studyNetwork and IT Security
- Credits7.5
- Course coordinatorJustine Moodley, Benjamin Rosenlund
The course provides knowledge of securing cloud computing and hybrid environments and skills to configure solutions based on project specifications. Cloud computing is renting resources, like storage space or CPU cycles instead of running the resources on their own equipment and securing these kinds of services are different compared to on-premises systems. The course is based on Microsoft Azure; however, the theory, concepts and terminology are standard among the major vendors, and the principles and elements of securing cloud and hybrid environments will be similar regardless of vendor.
The aim of the course is to provide fundamental competence to secure cloud services. The demand for increased performance, storage requirements increase, and the lines between on-premises computing versus cloud computing become more diffuse. Therefore, many businesses are currently moving fast towards cloud computing and the need for competent personnel to secure these services is also increasing. The course is also a logical follow-up to the Cloud Computing Foundations course in the second semester (and the Network and Systems Administration program), and the previous course – CyberOps.
The candidate:
- has knowledge of security, compliance, and identity concepts in cloud computing.
- can assess their own work in relation to securing networks in cloud and hybrid environments as a part of an end-to-end infrastructure.
- is familiar with the history, tradition, and distinctive nature of cloud computing and understands the necessity of securing cloud data.
- has insight into their own opportunities for development within topics related to cloud security elements.
The candidate:
- can explain their actions and choices in securing networks, virtual hosts, and cloud applications.
- can reflect over their vocational practice in security operations and adjust it under supervision.
- can find and refer to information and vocational material concerning security in cloud environments and assess its relevance in an overall ICT security strategy.
The candidate:
- can plan and carry out virtual machine host security and resource management projects alone or part of a group and per ethical requirements and principles in cloud computing.
- can contribute to organisational development within secure cloud and hybrid environments.
In this course, the following teaching and learning methods can be applied, but are not limited to:
- Lecture: Educator-led presentations or activities providing knowledge, skills, or general competencies in the subject area.
- Group work: Collaborative activities where students work together to solve problems or complete tasks.
- Tutoring: One-on-one or small group sessions with an instructor for personalized guidance and support.
- Student presentations: Opportunities for students to demonstrate their understanding of course material by presenting to peers.
- Online lessons: Digital content delivered via an online learning platform.
- Guidance: Individualized advice and direction from instructors to support students in their learning journey.
- Workshops: Practical sessions focused on hands-on application of theoretical concepts or skills.
- Self-study: Independent study where students engage with course material on their own without any teacher support.
Teaching materials, reading lists, and essential resources will be shared in the learning platform and software user manuals where applicable.