Cloud CyberSecurity
Overview
- General cybersecurity principles
- The shared responsibility model of security in cloud computing
- Data protection mechanisms
- Cloud asset protection
- Cloud identity and access management
- Vulnerability management
- Cloud network security
- Detecting security incidents in the cloud
- Responding to and recovering from security incidents in the cloud
- Regulatory compliance requirements and cloud audits
The methods of instruction for this course will include lectures, seminars, demonstrations, and hands-on assignments/projects.
Assessment will be in accordance with the Douglas College Evaluation Policy.
Assignments/labs |
15-25% |
Quizzes* |
10-25% |
Midterm Examination* |
25-35% |
Final Examination* |
25-40% |
|
|
Total |
100% |
* Practical hands-on computer exam
In order to pass the course, students must, in addition to receiving an overall course grade of 50%, also achieve a grade of at least 50% on the combined weighted examination components (including quizzes, tests, exams).
Students may conduct research as part of their coursework in this class. Instructors for the course are responsible for ensuring that student research projects comply with College policies on ethical conduct for research involving humans, which can require obtaining Informed Consent from participants and getting the approval of the Douglas College Research Ethics Board prior to conducting the research.
At the end of this course, the successful student will be able to:
- Apply general cybersecurity principles in the context of cloud computing
- Explain how the responsibilities for security are shared between cloud service providers and users
- Evaluate the appropriateness of data protection mechanism in cloud computing
- Compare assets protection mechanisms in cloud computing to similar mechanisms in traditional IT models
- Create appropriate security measures such as encryption, user access control and network security settings in a commercial cloud platform (e.g. Azure, AWS or Google Cloud)
- Explain the importance of vulnerability management, and be able to select appropriate strategies to identify and remove vulnerabilities
- Create appropriate monitoring strategies to detect security incidents in the cloud
- Apply appropriate strategies to respond to security incidents in the cloud, and to recover from them
- Explain the importance of regulatory compliance, and the role that cloud audits play in this context
- Judge the situational appropriateness of cloud security measures, and compare the resulting level of security to that of more traditional IT deployments
Practical Cloud Security – A Guide for Secure Design and Deployment by Chris Dotson, O’Reilly, latest edition
and/or
other textbook approved by department.
Requisites
Prerequisites
Min grade C in CSIS 4270 and 3560
Corequisites
Courses listed here must be completed either prior to or simultaneously with this course:
- No corequisite courses
Equivalencies
Courses listed here are equivalent to this course and cannot be taken for further credit:
- No equivalency courses
Course Guidelines
Course Guidelines for previous years are viewable by selecting the version desired. If you took this course and do not see a listing for the starting semester / year of the course, consider the previous version as the applicable version.
Course Transfers
These are for current course guidelines only. For a full list of archived courses please see https://www.bctransferguide.ca
Institution | Transfer Details for CSIS 4460 |
---|---|
Alexander College (ALEX) | ALEX CPSC 2XX (3) |
Athabasca University (AU) | AU COMP 3XX (3) |
College of New Caledonia (CNC) | CNC CSC 2XX (3) |
Coquitlam College (COQU) | No credit |
Kwantlen Polytechnic University (KPU) | No credit |
Thompson Rivers University (TRU) | TRU COMP 3XXX (3) |
University Canada West (UCW) | UCW CPSC 3XX (3) |
University of Northern BC (UNBC) | UNBC CPSC 3XX (3) |
University of the Fraser Valley (UFV) | UFV COMP 4XX (3) |
Course Offerings
Winter 2025
CRN | Days | Instructor | Status | More details |
---|---|---|---|---|
CRN
17480
|
Thu | Instructor Last Name
Wufka
Instructor First Name
Michael
|
Course Status
Open
|
CSIS 4460 002- Restricted to PBD Computer & Info Systems (Cybersecurity) until November 25, 2024, at 9:00 am. If you have any questions, please contact Ivan Wong at wongi5@douglascollege.ca