Course Title: Cloud Security

Part A: Course Overview

Course Title: Cloud Security

Credit Points: 12.00


Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE2401

City Campus

Postgraduate

140H Computer Science & Information Technology

Face-to-Face

Sem 1 2006,
Sem 2 2007,
Sem 1 2008,
Sem 1 2009,
Sem 1 2010,
Sem 1 2011,
Sem 1 2012,
Sem 2 2015,
Sem 2 2016

INTE2401

City Campus

Postgraduate

171H School of Science

Face-to-Face

Sem 2 2017

INTE2402

City Campus

Undergraduate

140H Computer Science & Information Technology

Face-to-Face

Sem 1 2006,
Sem 2 2007,
Sem 1 2008,
Sem 1 2009,
Sem 1 2010,
Sem 1 2011,
Sem 1 2012,
Sem 2 2015,
Sem 2 2016

INTE2402

City Campus

Undergraduate

171H School of Science

Face-to-Face

Sem 2 2017

Course Coordinator: Professor Xun Yi

Course Coordinator Phone: +61 3 9925 1902

Course Coordinator Email: xun.yi@rmit.edu.au

Course Coordinator Location: 14.11.21

Course Coordinator Availability: By appointment


Pre-requisite Courses and Assumed Knowledge and Capabilities

Enforced Prerequisite: 

COSC1295 Advanced Programming OR 

COSC1073 Programming 1 OR 

COSC1283 Programming Techniques

You may not enrol in this course unless one of these courses is explicitly listed in your enrolment program summary.    

Note it is a condition of enrolment at RMIT that you accept responsibility for ensuring that you have completed the prerequisite/s and agree to concurrently enrol in co-requisite courses before enrolling in a course.

For your information the RMIT Course Requisites policy can be found at Course requisites – 7.29.1.6: http://www.rmit.edu.au/browse;ID=twx09y07zi1c 


Course Description

Cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of technologies deployed to protect data, applications, and the associated infrastructure of cloud computing.

This course provides a practical survey of both the principles and practice of cloud security. The emphasis of this course is on the underlying principles and techniques of cloud security with examples of how they are applied in practice.   


Objectives/Learning Outcomes/Capability Development

Program Learning Outcomes

This course is an option course and not a core course, so that it does not need to contribute to the Program Learning Outcomes. 


Course Learning Outcomes

Upon successful completion of this course you should be able to:

  • CLO 1: Demonstrate knowledge of cloud security principles and mechanisms
  • CLO 2: Demonstrate  computer programming and configuration skills required to develop a cloud security infrastructure
  • CLO 3: Identify cloud security weaknesses by recognising and discovering threats and vulnerabilities to cloud computing
  • CLO 4: Problem solve how to fix cloud security weaknesses and mitigate security threats to cloud computing
  • CLO 5: Demonstrate knowledge and skills to prepare for industry cloud security certificate exams e.g. CCSK, CCSP
  • CLO 6: Communicate clearly and effectively using the technical language of the field correctly.    


Overview of Learning Activities

The learning activities included in this course are:

  • Lectures: Key concepts will be explained in lectures in which course material will be presented and the subject matter will be illustrated with demonstrations and examples;
  • Tutorial sessions focus on analysing and problem solving of given scenarios, such as security analysis and secure solutions;
  • Computer laboratory sessions provide practices in the application of security techniques; and
  • Peer-assisted and/or mentor-led learning programs may be available.    

 

A total of 120 hours of study is expected during this course, comprising:

Teacher-directed hours (48 hours): lectures, tutorials and laboratory sessions. Each week there will be 2 hours of lecture and tutorial plus 2 hours of computer laboratory work. You are encouraged to participate during lectures through asking questions, commenting on the lecture material based on your own experiences and through presenting solutions to written exercises. The tutorial / laboratory sessions will introduce you to the tools necessary to undertake the assignment work.

Student-directed hours (72 hours): You are expected to be self-directed, studying independently outside class.    


Overview of Learning Resources

The course is supported by the Blackboard learning management system which provides specific learning resources. See the RMIT Library Guide at http://rmit.libguides.com/compsci 


Overview of Assessment

The assessment for this course comprises class quizzes, computer laboratory practices, a written assignment, a mid-semester test and a formal written end-of-semester examination. The lab practices and assignment involve implementation of cloud security techniques.

Note: This course has no hurdle requirements.

 

Assessment tasks

Assessment Task 1:  Quizzes

Weekly In-class Quizzes after each lecture aim to provide early and continuous feedback to help you learn and remember key points.

Weighting 10%

This assessment task supports CLOs 1 & 5

Assessment Task 2: Computer Laboratory Practices

Weighting 20%

This assessment task supports CLOs 2 & 5

Assessment Task 3: Written Assignment

Weighting 10%

This assessment task supports CLOs 1, 2, 3, 4, 5 & 6

Assessment 4: Mid-semester Test

Weighting 10% 

This assessment supports CLOs 1, 2, 3, 4, 5 & 6

Assessment 5: End-of-Semester Examination

Weighting 50% 

This assessment supports CLOs 1, 2, 3, 4, 5 & 6

Please note that postgraduate students are expected to demonstrate deeper knowledge and higher level application of knowledge and skills than undergraduate students. There may be a postgraduate and an undergraduate version for both the mid-semester test and the end-of-semester examination.