Course Title: Cloud Security

Part A: Course Overview

Course Title: Cloud Security

Credit Points: 12.00

Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE2401

City Campus

Postgraduate

140H Computer Science & Information Technology

Face-to-Face

Sem 1 2006,
Sem 2 2007,
Sem 1 2008,
Sem 1 2009,
Sem 1 2010,
Sem 1 2011,
Sem 1 2012,
Sem 2 2015,
Sem 2 2016

INTE2401

City Campus

Postgraduate

171H School of Science

Face-to-Face

Sem 2 2017,
Sem 2 2018,
Sem 2 2019,
Sem 2 2020

INTE2401

City Campus

Postgraduate

175H Computing Technologies

Face-to-Face

Sem 1 2022,
Sem 1 2023,
Sem 1 2024

INTE2402

City Campus

Undergraduate

140H Computer Science & Information Technology

Face-to-Face

Sem 1 2006,
Sem 2 2007,
Sem 1 2008,
Sem 1 2009,
Sem 1 2010,
Sem 1 2011,
Sem 1 2012,
Sem 2 2015,
Sem 2 2016

INTE2402

City Campus

Undergraduate

171H School of Science

Face-to-Face

Sem 2 2017,
Sem 2 2018,
Sem 2 2019,
Sem 2 2020

INTE2402

City Campus

Undergraduate

175H Computing Technologies

Face-to-Face

Sem 1 2022,
Sem 1 2023,
Sem 1 2024

INTE2532

RMIT University Vietnam

Postgraduate

175H Computing Technologies

Face-to-Face

Viet1 2024

Course Coordinator: Professor Xun Yi

Course Coordinator Phone: +61 3 9925 1902

Course Coordinator Email: xun.yi@rmit.edu.au

Course Coordinator Location: 14.11.21

Course Coordinator Availability: By appointment


Pre-requisite Courses and Assumed Knowledge and Capabilities

Enforced Pre-Requisite Courses: 
Successful completion of: 

COSC1295 Advanced Programming OR 

COSC1073 Programming 1 OR 

COSC1283 Programming Techniques OR

COSC2804 Programming Studio 2 OR 

EEET2482 Software Engineering Design OR

COSC3054 Programming Bootcamp 1

Note: it is a condition of enrolment at RMIT that you accept responsibility for ensuring that you have completed the prerequisite/s and agree to concurrently enrol in co-requisite courses before enrolling in a course. 

For your information go to RMIT Course Requisites webpage. 


Course Description

Cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of technologies deployed to protect data, applications, and the associated infrastructure of cloud computing.

This course provides a practical survey of both the principles and practice of cloud security. The emphasis of this course is on the underlying principles and techniques of cloud security with examples of how they are applied in practice.   

Please note that if you take this course for a bachelor honours program, your overall mark in this course will be one of the course marks that will be used to calculate the weighted average mark (WAM) that will determine your award level. This applies to students who commence enrolment in a bachelor honours program from 1 January 2016 onwards. See the WAM information web page for more information.


Objectives/Learning Outcomes/Capability Development

Program Learning Outcomes

This course is an option course and not a core course, so that it does not need to contribute to the Program Learning Outcomes. 


Course Learning Outcomes

Upon successful completion of this course you should be able to:

  1. Demonstrate knowledge of cloud security principles and mechanisms
  2. Demonstrate computer programming and configuration skills required to develop a cloud security infrastructure
  3. Identify cloud security weaknesses by recognising and discovering threats and vulnerabilities to cloud computing
  4. Problem solve how to fix cloud security weaknesses and mitigate security threats to cloud computing
  5. Demonstrate knowledge and skills to prepare for industry cloud security certificate exams e.g. CCSK, CCSP
  6. Communicate clearly and effectively using the technical language of the field correctly


Overview of Learning Activities

The learning activities included in this course are:

  • Lectorials: Key concepts will be explained in lectorials in which course material will be presented and the subject matter will be illustrated with demonstrations and examples;
  • Tutorial sessions focus on analysing and problem solving of given scenarios, such as security analysis and secure solutions;
  • Computer laboratory sessions provide practices in the application of security techniques.


Overview of Learning Resources

The course is supported by the Canvas learning management system which provides specific learning resources. See the RMIT Library Guide at http://rmit.libguides.com/compsci 


Overview of Assessment

The assessment for this course comprises three assignments and a final 2-hour online quiz.
The lab practices and assignment involve implementation of cloud security techniques.

Note: This course has no hurdle requirements.

Assessment tasks

Assessment Task 1: Assignment 1 
Weighting: 15% 
This assessment task supports CLOs 1, 2 & 3

Assessment Task 2: Assignment 2 
Weighting: 35% 
This assessment task supports CLOs 1, 2, 3, 4, 5 & 6

Assessment Task 3: Assignment 3 
Weighting: 35% 
This assessment task supports CLOs 1, 2, 3, 4, 5 & 6

Assessment Task 4: Final 2-hour Online Quiz 
Weighting: 15%
This assessment task supports CLOs 1, 2, 3, 4, 5 & 6

Please note that postgraduate students are expected to demonstrate deeper knowledge and higher level application of knowledge and skills than undergraduate students.