Cloud CyberSecurity

Curriculum Guideline

Effective Date:
Course
Discontinued
No
Course Code
CSIS 4460
Descriptive
Cloud CyberSecurity
Department
Computing Studies & Information Systems
Faculty
Commerce & Business Administration
Credits
3.00
Start Date
End Term
Not Specified
PLAR
No
Semester Length
15 Weeks
Max Class Size
35
Course Designation
None
Industry Designation
CCSP,CEH,CFCE,CHFI,CISA,CISM,CISSP,CRISC,GCFA,GCFE,GSEC,OSCP
Contact Hours

Lecture: 2 hours/week

Seminar: 2 hours/week

Method(s) Of Instruction
Lecture
Seminar
Learning Activities

The methods of instruction for this course will include lectures, seminars, demonstrations, and hands-on assignments/projects.

Course Description
The objective of the course is to provide students with the knowledge and practical experience in identifying and mitigating potential attacks on cloud computing platforms and shared service environments.
Course Content
  1. General cybersecurity principles
  2. The shared responsibility model of security in cloud computing
  3. Data protection mechanisms
  4. Cloud asset protection
  5. Cloud identity and access management 
  6. Vulnerability management
  7. Cloud network security
  8. Detecting security incidents in the cloud
  9. Responding to and recovering from security incidents in the cloud
  10. Regulatory compliance requirements and cloud audits
Learning Outcomes

At the end of this course, the successful student will be able to:

  1. Apply general cybersecurity principles in the context of cloud computing
  2. Explain how the responsibilities for security are shared between cloud service providers and users
  3. Evaluate the appropriateness of data protection mechanism in cloud computing
  4. Compare assets protection mechanisms in cloud computing to similar mechanisms in traditional IT models
  5. Create appropriate security measures such as encryption, user access control and network security settings in a commercial cloud platform (e.g. Azure, AWS or Google Cloud)
  6. Explain the importance of vulnerability management, and be able to select appropriate strategies to identify and remove vulnerabilities
  7. Create appropriate monitoring strategies to detect security incidents in the cloud
  8. Apply appropriate strategies to respond to security incidents in the cloud, and to recover from them
  9. Explain the importance of regulatory compliance, and the role that cloud audits play in this context
  10. Judge the situational appropriateness of cloud security measures, and compare the resulting level of security to that of more traditional IT deployments
Means of Assessment

Assessment will be in accordance with the Douglas College Evaluation Policy.

Assignments/labs

15-25%

Quizzes*

10-25%

Midterm Examination*

25-35%

Final Examination*

25-40%

 

 

Total                                  

100%

* Practical hands-on computer exam

In order to pass the course, students must, in addition to receiving an overall course grade of 50%, also achieve a grade of at least 50% on the combined weighted examination components (including quizzes, tests, exams).

Students may conduct research as part of their coursework in this class. Instructors for the course are responsible for ensuring that student research projects comply with College policies on ethical conduct for research involving humans, which can require obtaining Informed Consent from participants and getting the approval of the Douglas College Research Ethics Board prior to conducting the research.

Textbook Materials

Practical Cloud Security – A Guide for Secure Design and Deployment by Chris Dotson, O’Reilly, latest edition

and/or

other textbook approved by department.

Prerequisites

Min grade C in CSIS 4270 and 3560

Corequisites

Courses listed here must be completed either prior to or simultaneously with this course:

  • No corequisite courses
Equivalencies

Courses listed here are equivalent to this course and cannot be taken for further credit:

  • No equivalency courses