Apr 16, 2024  
2023-24 Catalog 
    
2023-24 Catalog
Add to Portfolio (opens a new window)

CIS 420 - Cloud Security

5 Credits
This course focuses on the security of cloud infrastructure and data protection in cloud environments. Students research cloud security threats and make remediation recommendations. Special attention will be paid to the security of web applications. Labs in cloud environments provide hands-on (as much as anything in the cloud is hands-on) experience with the services specific to the major cloud platforms.

Pre-requisite(s) CIS 320 min . 2.0
Program Admission Required Yes Admitted Program BAS - CIS
FeesCF

Quarters Typically Offered
Winter Evening
Spring Evening

Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 20230320T11:43:39

Grading Basis Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
  1. Introduction to cloud computing and security
    1. Evolution of cloud computing
    2. Shared responsibility model
  2. Identifying threats to data protection in the cloud
    1. Open-source intelligence
    2. Vulnerability assessment
  3. Securing access to cloud resources
    1. Identity and access management
    2. Identity and resource policies
  4. Securing infrastructure
    1. Web application tiering
    2. Cloud network security
  5. Protecting application data
    1. Object storage security
    2. Methods of enforcing static and dynamic encryption
  6. Logging and monitoring
    1. Log ingesting and observability
    2. System health checking
  7. Incident detection and response
    1. Alerting on events
    2. Preparing for and managing incidents


Student Learning Outcomes
Identify security benefits and responsibilities of using cloud services

Deploy infrastructure in cloud environments

Use the identity and access management features of cloud environments

Implement secure network access to resources

Identify cloud services that help protect data, including at rest and in transit

Identify and implement storage protection features

Describe cloud services that are used for incident recognition and remediation

Implement best practices for incident response



Add to Portfolio (opens a new window)