Course Title: Cloud Security
Part A: Course Overview
Course Title: Cloud Security
Credit Points: 12.00
Terms
Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
INTE2401 |
City Campus |
Postgraduate |
140H Computer Science & Information Technology |
Face-to-Face |
Sem 1 2006, Sem 2 2007, Sem 1 2008, Sem 1 2009, Sem 1 2010, Sem 1 2011, Sem 1 2012, Sem 2 2015, Sem 2 2016 |
INTE2401 |
City Campus |
Postgraduate |
171H School of Science |
Face-to-Face |
Sem 2 2017, Sem 2 2018, Sem 2 2019, Sem 2 2020 |
INTE2401 |
City Campus |
Postgraduate |
175H Computing Technologies |
Face-to-Face |
Sem 1 2022, Sem 1 2023, Sem 1 2024 |
INTE2402 |
City Campus |
Undergraduate |
140H Computer Science & Information Technology |
Face-to-Face |
Sem 1 2006, Sem 2 2007, Sem 1 2008, Sem 1 2009, Sem 1 2010, Sem 1 2011, Sem 1 2012, Sem 2 2015, Sem 2 2016 |
INTE2402 |
City Campus |
Undergraduate |
171H School of Science |
Face-to-Face |
Sem 2 2017, Sem 2 2018, Sem 2 2019, Sem 2 2020 |
INTE2402 |
City Campus |
Undergraduate |
175H Computing Technologies |
Face-to-Face |
Sem 1 2022, Sem 1 2023, Sem 1 2024 |
INTE2532 |
RMIT University Vietnam |
Postgraduate |
175H Computing Technologies |
Face-to-Face |
Viet1 2024 |
Course Coordinator: Professor Xun Yi
Course Coordinator Phone: +61 3 9925 1902
Course Coordinator Email: xun.yi@rmit.edu.au
Course Coordinator Location: 14.11.21
Course Coordinator Availability: By appointment
Pre-requisite Courses and Assumed Knowledge and Capabilities
Enforced Pre-Requisite Courses:
Successful completion of:
COSC1295 Advanced Programming OR
COSC1073 Programming 1 OR
COSC1283 Programming Techniques OR
COSC2804 Programming Studio 2 OR
EEET2482 Software Engineering Design OR
COSC3054 Programming Bootcamp 1
Note: it is a condition of enrolment at RMIT that you accept responsibility for ensuring that you have completed the prerequisite/s and agree to concurrently enrol in co-requisite courses before enrolling in a course.
For your information go to RMIT Course Requisites webpage.
Course Description
Cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of technologies deployed to protect data, applications, and the associated infrastructure of cloud computing.
This course provides a practical survey of both the principles and practice of cloud security. The emphasis of this course is on the underlying principles and techniques of cloud security with examples of how they are applied in practice.
Please note that if you take this course for a bachelor honours program, your overall mark in this course will be one of the course marks that will be used to calculate the weighted average mark (WAM) that will determine your award level. This applies to students who commence enrolment in a bachelor honours program from 1 January 2016 onwards. See the WAM information web page for more information.
Objectives/Learning Outcomes/Capability Development
Program Learning Outcomes
This course is an option course and not a core course, so that it does not need to contribute to the Program Learning Outcomes.
Course Learning Outcomes
Upon successful completion of this course you should be able to:
- Demonstrate knowledge of cloud security principles and mechanisms
- Demonstrate computer programming and configuration skills required to develop a cloud security infrastructure
- Identify cloud security weaknesses by recognising and discovering threats and vulnerabilities to cloud computing
- Problem solve how to fix cloud security weaknesses and mitigate security threats to cloud computing
- Demonstrate knowledge and skills to prepare for industry cloud security certificate exams e.g. CCSK, CCSP
- Communicate clearly and effectively using the technical language of the field correctly
Overview of Learning Activities
The learning activities included in this course are:
- Lectorials: Key concepts will be explained in lectorials in which course material will be presented and the subject matter will be illustrated with demonstrations and examples;
- Tutorial sessions focus on analysing and problem solving of given scenarios, such as security analysis and secure solutions;
- Computer laboratory sessions provide practices in the application of security techniques.
Overview of Learning Resources
The course is supported by the Canvas learning management system which provides specific learning resources. See the RMIT Library Guide at http://rmit.libguides.com/compsci
Overview of Assessment
The assessment for this course comprises three assignments and a final 2-hour online quiz.
The lab practices and assignment involve implementation of cloud security techniques.
Note: This course has no hurdle requirements.
Assessment tasks
Assessment Task 1: Assignment 1
Weighting: 15%
This assessment task supports CLOs 1, 2 & 3
Assessment Task 2: Assignment 2
Weighting: 35%
This assessment task supports CLOs 1, 2, 3, 4, 5 & 6
Assessment Task 3: Assignment 3
Weighting: 35%
This assessment task supports CLOs 1, 2, 3, 4, 5 & 6
Assessment Task 4: Final 2-hour Online Quiz
Weighting: 15%
This assessment task supports CLOs 1, 2, 3, 4, 5 & 6
Please note that postgraduate students are expected to demonstrate deeper knowledge and higher level application of knowledge and skills than undergraduate students.