|   | 
		
			 
				Nov 03, 2025			
		 | 
		  | 
		
	
 | 
		
	     
			
		  	| 
  
		 | 
          
            
              
                
                  
                  CIS 420 - Cloud Security5 Credits  This course focuses on the security of cloud infrastructure and data protection in cloud environments. Students research cloud security threats and make remediation recommendations. Special attention will be paid to the security of web applications. Labs in cloud environments provide hands-on (as much as anything in the cloud is hands-on) experience with the services specific to the major cloud platforms.
  Pre-requisite(s) CIS 320 min . 2.0 Program Admission Required Yes Admitted Program BAS - CIS FeesCF     
  Quarters Typically Offered Winter Evening Spring Evening
  Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics. Active Date 20230320T11:43:39
  Grading Basis Decimal Grade  Class Limit 24 Contact Hours: Lecture 44 Lab 22    Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline  
	- Introduction to cloud computing and security
	
		- Evolution of cloud computing
 
		- Shared responsibility model
 
	 
	 
	- Identifying threats to data protection in the cloud
	
		- Open-source intelligence
 
		- Vulnerability assessment
 
	 
	 
	- Securing access to cloud resources
	
		- Identity and access management
 
		- Identity and resource policies
 
	 
	 
	- Securing infrastructure
	
		- Web application tiering
 
		- Cloud network security
 
	 
	 
	- Protecting application data
	
		- Object storage security
 
		- Methods of enforcing static and dynamic encryption
 
	 
	 
	- Logging and monitoring
	
		- Log ingesting and observability
 
		- System health checking
 
	 
	 
	- Incident detection and response
	
		- Alerting on events
 
		- Preparing for and managing incidents
 
	 
	 
 
  Student Learning Outcomes Identify security benefits and responsibilities of using cloud services
  Deploy infrastructure in cloud environments
  Use the identity and access management features of cloud environments
  Implement secure network access to resources
  Identify cloud services that help protect data, including at rest and in transit
  Identify and implement storage protection features
  Describe cloud services that are used for incident recognition and remediation
  Implement best practices for incident response
  
				  
 
   
			
				Add to Portfolio (opens a new window)
			                   | 
               
             
             |