Part A: Course Overview
Course Title: Cloud Security
Credit Points: 12.00
Terms
Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
INTE2401 |
City Campus |
Postgraduate |
140H Computer Science & Information Technology |
Face-to-Face |
Sem 1 2006, Sem 2 2007, Sem 1 2008, Sem 1 2009, Sem 1 2010, Sem 1 2011, Sem 1 2012, Sem 2 2015, Sem 2 2016 |
INTE2401 |
City Campus |
Postgraduate |
171H School of Science |
Face-to-Face |
Sem 2 2017, Sem 2 2018, Sem 2 2019, Sem 2 2020 |
INTE2401 |
City Campus |
Postgraduate |
175H Computing Technologies |
Face-to-Face |
Sem 1 2022, Sem 1 2023, Sem 1 2024, Sem 1 2025 |
INTE2402 |
City Campus |
Undergraduate |
140H Computer Science & Information Technology |
Face-to-Face |
Sem 1 2006, Sem 2 2007, Sem 1 2008, Sem 1 2009, Sem 1 2010, Sem 1 2011, Sem 1 2012, Sem 2 2015, Sem 2 2016 |
INTE2402 |
City Campus |
Undergraduate |
171H School of Science |
Face-to-Face |
Sem 2 2017, Sem 2 2018, Sem 2 2019, Sem 2 2020 |
INTE2402 |
City Campus |
Undergraduate |
175H Computing Technologies |
Face-to-Face |
Sem 1 2022, Sem 1 2023, Sem 1 2024, Sem 1 2025 |
INTE2532 |
RMIT University Vietnam |
Postgraduate |
175H Computing Technologies |
Face-to-Face |
Viet1 2024 |
Course Coordinator: Professor Xun Yi
Course Coordinator Phone: +61 3 9925 1902
Course Coordinator Email: xun.yi@rmit.edu.au
Course Coordinator Location: 14.11.21
Course Coordinator Availability: By appointment
Pre-requisite Courses and Assumed Knowledge and Capabilities
Enforced Pre-Requisite Courses:
Successful completion of:
-
COSC2712/COSC2081/COSC1073 Programming 1 (Course ID 004065)
OR - COSC2803/COSC3056/COSC3057 Java Programming Studio (Course ID 054081)
Note: it is a condition of enrolment at RMIT that you accept responsibility for ensuring that you have completed the prerequisite/s and agree to concurrently enrol in co-requisite courses before enrolling in a course.
For your information go to RMIT Course Requisites webpage.
If you have completed prior studies at RMIT or another institution that developed the skills and knowledge covered in the above course/s you may be eligible to apply for credit transfer.
Alternatively, if you have prior relevant work experience that developed the skills and knowledge covered in the above course/s you may be eligible for recognition of prior learning.
Please follow the link for further information on how to apply for credit for prior study or experience.
Course Description
Cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of technologies deployed to protect data, applications, and the associated infrastructure of cloud computing.
This course provides a practical survey of both the principles and practice of cloud security. The emphasis of this course is on the underlying principles and techniques of cloud security with examples of how they are applied in practice.
Please note that if you take this course for a bachelor honours program, your overall mark in this course will be one of the course marks that will be used to calculate the weighted average mark (WAM) that will determine your award level. This applies to students who commence enrolment in a bachelor honours program from 1 January 2016 onwards. See the WAM information web page for more information.
Objectives/Learning Outcomes/Capability Development
Program Learning Outcomes
This course is an option course so it is not required to contribute to the development of program learning outcomes (PLOs) though it may assist your achievement of several PLOs.
For more information on the program learning outcomes for your program, please see the program guide.
Upon successful completion of this course you should be able to:
- Demonstrate knowledge of cloud security principles and mechanisms
- Demonstrate computer programming and configuration skills required to develop a cloud security infrastructure
- Identify cloud security weaknesses by recognising and discovering threats and vulnerabilities to cloud computing
- Problem solve how to fix cloud security weaknesses and mitigate security threats to cloud computing
- Demonstrate knowledge and skills to prepare for industry cloud security certificate exams e.g. CCSK, CCSP
- Communicate clearly and effectively using the technical language of the field correctly
Overview of Learning Activities
The learning activities included in this course are:
- Lectorials: Key concepts will be explained in lectorials in which course material will be presented and the subject matter will be illustrated with demonstrations and examples;
- Tutorial sessions focus on analysing and problem solving of given scenarios, such as security analysis and secure solutions;
- Computer laboratory sessions provide practices in the application of security techniques.
Overview of Learning Resources
The course is supported by the Canvas learning management system which provides specific learning resources. See the RMIT Library Guide at http://rmit.libguides.com/compsci
Overview of Assessment
Note: This course has no hurdle requirements.
Assessment tasks
Assessment Task 1: Assignment 1
Weighting: 15%
This assessment task supports CLOs 1, 2 & 3
Assessment Task 2: Assignment 2
Weighting: 35%
This assessment task supports CLOs 1, 2, 3, 4, 5 & 6
Assessment Task 3: Assignment 3
Weighting: 35%
This assessment task supports CLOs 1, 2, 3, 4, 5 & 6
Assessment Task 4: Final 2-hour Online Quiz
Weighting: 15%
This assessment task supports CLOs 1, 2, 3, 4, 5 & 6
If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.