Aim
To enable students to understand the technologies and services that enable cloud computing, discuss different types of cloud computing models and investigate security and legal issues associated with cloud computing.
Learning Outcomes
On successful completion of this course, the learner will be able to:
- Compare and contrast the various cloud delivery and deployment models, particularly the security implications of each.
- Analyse virtualisation technology and current attacks against it.
- Critically evaluate service orchestration, business continuity, security, and
service management functions for a cloud infrastructure.
- Appraise the mechanisms used to secure cloud computing platforms, including trustworthy computing, secure computation, and data security in cloud environments.
- Analyse the challenges that cloud computing introduces for regulatory compliance and digital forensics.
Indicative content
- Cybersecurity concepts, roles, threat model, problem escalation paths, legal environment and compliance requirements.
- Technical security techniques, tools (including tool validation), reporting, compliance to best practice (rules of engagement, penetration testing contracts and others).
- Practical security testing.
- Exposure to a wide range of tools, operating systems and attack techniques.
- Providing input to the security threat model and suggesting security policy solutions.
- Business security testing