Semester 2, 2023 Online | |
Units : | 1 |
School or Department : | School of Business |
Grading basis : | Graded |
Course fee schedule : | /current-students/administration/fees/fee-schedules |
Staffing
Course Coordinator:
Requisites
Pre-requisite: CSC8100 and CIS5100 and Students must be enrolled in the following Program: MCYS; OR
Pre-requisite or Co-requisite: CSC6002 and Students must be enrolled in the following Program: MADS
Overview
This course explores the emergence of cloud computing and provides knowledge of securely architecting and operating information system environments. Cloud computing environments have rapidly emerged to comprise a large portion of many business and organisational settings and have specific cyber security considerations to non-virtualised traditional infrastructure. This is an important and often underserved knowledge and skill set for cybersecurity professionals, corporations, businesses, and public institutions. There are many examples of major data breaches and adverse system impact due to poorly secured cloud environments and this course examines these aspects.
This course provides students with knowledge and best practice principles in securing Cloud based systems, being virtualised computer system environments. It examines key considerations and areas of cyber security relating to securing private, public, hybrid and community cloud environments. It explores a variety of cloud specific considerations in ensuring business continuity and data security.
Course learning outcomes
On successful completion of this course students should be able to:
- apply fundamental and advanced knowledge relating to cloud computing to secure business environments;
- synthesise complex issues, problems, concepts and theories relating to cloud computing security;
- articulate how specialist knowledge and skills can be used in securing diverse business applications of cloud computing;
- critically assess how knowledge gained from various sources may be applied towards solutions for cloud computing related business problems;
- communicate complex issues relating to cloud security to achieve targeted outcomes.
Topics
Description | Weighting(%) | |
---|---|---|
1. | Cloud Fundamentals | 10.00 |
2. | Cloud Computing Architecture | 20.00 |
3. | Securing Virtualised Environments | 15.00 |
4. | Public Cloud Infrastructure Security | 15.00 |
5. | Cloud Integration Security | 15.00 |
6. | Managing Business Risk in Cloud Environments | 25.00 |
Text and materials required to be purchased or accessed
Student workload expectations
To do well in this subject, students are expected to commit approximately 10 hours per week including class contact hours, independent study, and all assessment tasks. If you are undertaking additional activities, which may include placements and residential schools, the weekly workload hours may vary.
Assessment details
Description | Group Assessment |
Weighting (%) | Course learning outcomes |
---|---|---|---|
Quiz | No | 10 | 1,2,3 |
Report | No | 40 | 1,2,3,4,5 |
Time limited online examinatn | No | 50 | 1,2,3,4 |