|
Jan 15, 2025
|
|
|
|
CIS 420 - Cloud Security5 Credits This course focuses on the security of cloud infrastructure and data protection in cloud environments. Students research cloud security threats and make remediation recommendations. Special attention will be paid to the security of web applications. Labs in cloud environments provide hands-on (as much as anything in the cloud is hands-on) experience with the services specific to the major cloud platforms.
Pre-requisite(s) CIS 320 min . 2.0 Program Admission Required Yes Admitted Program BAS - CIS FeesCF
Quarters Typically Offered Winter Evening Spring Evening
Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics. Active Date 20230320T11:43:39
Grading Basis Decimal Grade Class Limit 24 Contact Hours: Lecture 44 Lab 22 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline
- Introduction to cloud computing and security
- Evolution of cloud computing
- Shared responsibility model
- Identifying threats to data protection in the cloud
- Open-source intelligence
- Vulnerability assessment
- Securing access to cloud resources
- Identity and access management
- Identity and resource policies
- Securing infrastructure
- Web application tiering
- Cloud network security
- Protecting application data
- Object storage security
- Methods of enforcing static and dynamic encryption
- Logging and monitoring
- Log ingesting and observability
- System health checking
- Incident detection and response
- Alerting on events
- Preparing for and managing incidents
Student Learning Outcomes Identify security benefits and responsibilities of using cloud services
Deploy infrastructure in cloud environments
Use the identity and access management features of cloud environments
Implement secure network access to resources
Identify cloud services that help protect data, including at rest and in transit
Identify and implement storage protection features
Describe cloud services that are used for incident recognition and remediation
Implement best practices for incident response
Add to Portfolio (opens a new window)
|
|