Jun 07, 2020  
2017-2018 Catalog 
2017-2018 Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CIS 420 - Cloud Security

5 Credits
Students must be admitted into Cybersecurity and Forensics BAS program to take this class. This course focuses on how to secure cloud servers and data in the cloud. Students will examine the various contracts available from cloud service providers; explore what it entailed in creating your own private cloud and what is involved in securing both. Students will have to design a secure network that includes a cloud component. They will then test against standard attacks including new ones that may come in the news during class. This class focuses on the cloud aspects of security and monitoring

Pre-requisite(s) CIS 320
Program Admission Required Yes Admitted Program BAS - CIS
Fees CF

Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 2015-05-28

Grading System Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22 Worksite 0 Clinical 0 Other 0
Total Contact Hours 66
Degree Distributions:
Course Outline
Introduction to Cloud Computing and Security

Evolution of Cloud Computing, Understand different deployment and service models of cloud computing (CC), NIST definition of Cloud Computing, SaaS, PaaS, PaaS, private, public, community and hybrid

Identify different security threats in data communication and Cloud Computing

Data in Motion, Data in Process, Data at Stay, Access Control, Data Separation

Common threats in Cloud Computing (according to Cloud Security Alliance)

Abuse and Nefarious Use of Cloud Computing, Insecure Interfaces and APIs, Malicious Insiders, Shared Technology Issues, Data Loss or Leakage, Account or Service Hijacking, Unknown Risk Profile

Cloud Computing Security Strategy

System hardening, patch and configuration management, internal policy, application security for IaaS, PaaS, and PaaS, auditing, threat analysis, risk management, account control, physical access

Installation, Maintenance and Optimization of Cloud Computing

Build and configure cloud system by using various cloud computing tools, load balance, backup

Penetration testing in Cloud Computing

Perform penetration testing by using various tools to discover threats in: IaaS, PaaS, IaaS Hypervisor and WebApps and Internal Iaas/PaaS network and hosts, Pentesting tools may include: Nmap, Nessus, Metasploit Framework, Nikto, Wireshark, KisMAC and Kismet, Ethics and legal issues

Intrusion detection and Response

Identify security threats and vulnerabilities to cloud computing system

Countermeasures used to defend against attacks and weaknesses.

Use evidence gathering procedures and tools to investigate intrusion and create incident response report

Disaster Recovery Plan (DRP) in Cloud Computing

Examine the effect of threats and vulnerabilities on Cloud Computing systems

Perform risk and impact analysis to determine the probable cost of risk exposure in CC.

Perform a risk assessment and examine common risk management strategies in CC

Develop a proactive disaster recovery plan for an IS. The following terminologies must be covered in this section:

DRP, Recovery Time Objective (RTO), Recovery Point Objective (RPO), Identify key events triggers disaster and assess the impact, Cost constraints in terms initial cost, data transfer and data storage. Evaluate risk, types of disaster such as natural and man-made disaster, sabotage and cyber-warfare, Business Impact Analysis (BIA)

Student Learning Outcomes
Prepare reports on various Cloud Computing deployment methods and service models. Use charts, graphs and statistics to compare and point out the advantage and disadvantage of each type.

Prepare reports on common data communication security threats.

Prepare reports on different threat types of Cloud Computing. Select various types of security threats to be used on lab environment.

Perform system hardening in lab and prepare report on the best cloud computing security practice.

Perform cloud system optimization, monitoring load balance in lab.

Perform penetration testing on cloud by using various types of penetration testing tools and document the process.

Perform intrusion detection by using various network management tools and report the intrusion and prepare network incident reports .

Add to Portfolio (opens a new window)