Professional Documents
Culture Documents
0. MECH1043_CI Cloud Computing Security. SEM2 2023-2024
0. MECH1043_CI Cloud Computing Security. SEM2 2023-2024
Course synopsis In this course, we are going to learn about common cloud misconfigurations, how to perform a
risk assessment and verify compliance for various Cloud Services. Further, we will delve deeper
into identifying security risks in these cloud services and to implement best practices to mitigate
the common cloud misconfigurations. Other topics include topics of data ownership, privacy
protections, data mobility, quality of service and service levels, bandwidth costs, data
protection, and support.
Course coordinator
(if applicable) Dr Mohd. Zamri Bin Osman
Telephone E-mail
Course lecturer(s)/ Name Office
(07) 55- @utm.my
346-19 Level 3 mohdzamri.osman
Dr. Mohd. Zamri Bin Osman 019-9126239
N28 @utm.my
Mapping of the Course Learning Outcomes (CLO) to the Programme Learning Outcomes (PLO), Teaching & Learning
(T&L) methods and Assessment methods:
PLO Taxonomies
Weight Assessment
No. CLO (Code) and T&L methods
(%) methods
generic skills
Analyse fundamental cyber
security issues, requirements Lecture,
PLO1
CLO1 and concepts in Cloud 30 C4 Blended T, IP
(KW)
Computing platform and learning
services.
Evaluate different methods and Project Based
PLO2
CLO2 techniques that address security 45 C5 learning, FE, GP
(CG)
risks in the cloud services. Lecture
Display best practices on
PLO3 Formative
CLO3 handling common cloud security 15 P5 CAD
(PS) Assessment
misconfigurations/issues.
Defend orally the proposed
PLO5
design/framework on providing A4, Project Based
CLO4 (CS) 10 PR
trusted and effective security CS5 learning
and privacy on Cloud.
IP – Individual Project; CAD – Case Analysis and Discussion; GP – Group Project; PR – Presentation; T- Test; FE – Final
Exam
Weekly Schedule:
Week 7 BREAK
Transferable skills (generic skills learned in course of study which can be useful and utilised in other settings):
Student’s scholarship generic skill can be applicable in courses that required the experience of conducting literature
review.
(6h)
Special requirement to deliver the course (e.g: software, nursery, computer lab, simulation room):
Microsoft Azure/ AWS Cloud Computing platform.
Learning resources:
Text book (if applicable)
Main: Ronald L. Krutz, Russell Dean Vines (2010 ). Cloud Security: A Comprehensive Guide to Secure Cloud Computing.
Wiley.
Chandrasekaran, K., (2015). Essentials of Cloud Computing. CRC Press.
Vacca, J.R. ed., (2017). Cloud computing security: Foundations and Challenges. CRC press.
Additional references
Online
http://elearning.utm.my
https://www.iisecurity.in/courses/cloud-computing-security-course.php
While every effort has been made to ensure the accuracy of the information supplied herein, Universiti Teknologi
Malaysia cannot be held responsible for any errors or omissions.