Cloud CyberSecurity

Commerce & Business Administration
Computing Studies & Information Systems
Course Code
CSIS 4460
Semester Length
15 Weeks
Max Class Size
Method Of Instruction
Typically Offered
To be determined


Course Description
The objective of the course is to provide students with the knowledge and practical experience in identifying and mitigating potential attacks on cloud computing platforms and shared service environments.
Course Content
  1. General cybersecurity principles
  2. The shared responsibility model of security in cloud computing
  3. Data protection mechanisms
  4. Cloud asset protection
  5. Cloud identity and access management 
  6. Vulnerability management
  7. Cloud network security
  8. Detecting security incidents in the cloud
  9. Responding to and recovering from security incidents in the cloud
  10. Regulatory compliance requirements and cloud audits
Methods Of Instruction

The methods of instruction for this course will include lectures, seminars, demonstrations, and hands-on assignments/projects.

Means of Assessment

Assessment will be in accordance with the Douglas College Evaluation Policy.





Midterm Examination*


Final Examination*






* Practical hands-on computer exam

In order to pass the course, students must, in addition to receiving an overall course grade of 50%, also achieve a grade of at least 50% on the combined weighted examination components (including quizzes, tests, exams).

Students may conduct research as part of their coursework in this class. Instructors for the course are responsible for ensuring that student research projects comply with College policies on ethical conduct for research involving humans, which can require obtaining Informed Consent from participants and getting the approval of the Douglas College Research Ethics Board prior to conducting the research.

Learning Outcomes

At the end of this course, the successful student will be able to:

  1. Apply general cybersecurity principles in the context of cloud computing
  2. Explain how the responsibilities for security are shared between cloud service providers and users
  3. Evaluate the appropriateness of data protection mechanism in cloud computing
  4. Compare assets protection mechanisms in cloud computing to similar mechanisms in traditional IT models
  5. Create appropriate security measures such as encryption, user access control and network security settings in a commercial cloud platform (e.g. Azure, AWS or Google Cloud)
  6. Explain the importance of vulnerability management, and be able to select appropriate strategies to identify and remove vulnerabilities
  7. Create appropriate monitoring strategies to detect security incidents in the cloud
  8. Apply appropriate strategies to respond to security incidents in the cloud, and to recover from them
  9. Explain the importance of regulatory compliance, and the role that cloud audits play in this context
  10. Judge the situational appropriateness of cloud security measures, and compare the resulting level of security to that of more traditional IT deployments
Textbook Materials

Practical Cloud Security – A Guide for Secure Design and Deployment by Chris Dotson, O’Reilly, latest edition


other textbook approved by department.



Min grade C in CSIS 4270 and 3560


No corequisite courses.


No equivalent courses.

Course Guidelines

Course Guidelines for previous years are viewable by selecting the version desired. If you took this course and do not see a listing for the starting semester / year of the course, consider the previous version as the applicable version.

Course Transfers

Institution Transfer Details Effective Dates
There are no applicable transfer credits for this course.

Course Offerings

Fall 2021

There aren't any scheduled upcoming offerings for this course.