Active Outline
General Information
- Course ID (CB01A and CB01B)
- CIS D105.
- Course Title (CB02)
- Cloud Security Fundamentals
- Course Credit Status
- Credit - Degree Applicable
- Effective Term
- Fall 2023
- Course Description
- This course explores how to secure a cloud environment and provides the history of cloud computing and how cloud computing is being used today. Various cloud environments such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) and understanding both native and hybrid environments will also be explored. Topics including network security, host security, Identity and Access Management (IAM), cryptography and data protection, access controls, patch management, as well as credential and key management will be examined. Cloud security operations including logging, incident response in the cloud, as well as preventative and self-correcting security controls using labs exercises will be investigated. This hands-on course is designed to prepare students for modern-day infrastructure environments.
- Faculty Requirements
- Course Family
- Not Applicable
Course Justification
This is a course in a CTE program that was developed based on state and national trends needing computer security professionals. This course belongs on the Enterprise Security Professional Certificates and A.A. degree. This course provides students with the foundation skills for computer security and supports professional employment in the Silicon Valley. This course addresses the issue of protecting computer systems in the Cloud.
Foothill Equivalency
- Does the course have a Foothill equivalent?
- No
- Foothill Course ID
Formerly Statement
Course Development Options
- Basic Skill Status (CB08)
- Course is not a basic skills course.
- Grade Options
- Letter Grade
- Pass/No Pass
- Repeat Limit
- 0
Transferability & Gen. Ed. Options
- Transferability
- Not transferable
Units and Hours
Summary
- Minimum Credit Units
- 4.5
- Maximum Credit Units
- 4.5
Weekly Student Hours
Type | In Class | Out of Class |
---|---|---|
Lecture Hours | 4.0 | 8.0 |
Laboratory Hours | 1.5 | 0.0 |
Course Student Hours
- Course Duration (Weeks)
- 12.0
- Hours per unit divisor
- 36.0
Course In-Class (Contact) Hours
- Lecture
- 48.0
- Laboratory
- 18.0
- Total
- 66.0
Course Out-of-Class Hours
- Lecture
- 96.0
- Laboratory
- 0.0
- NA
- 0.0
- Total
- 96.0
Prerequisite(s)
Corequisite(s)
Advisory(ies)
ESL D261. and ESL D265., or ESL D461. and ESL D465., or eligibility for EWRT D001A or EWRT D01AH or ESL D005.
CIS D046.
Limitation(s) on Enrollment
Entrance Skill(s)
General Course Statement(s)
Methods of Instruction
Lecture and visual aids
Discussion of assigned reading
Discussion and problem solving performed in class
Quiz and examination review performed in class
Homework and extended projects
Collaborative projects
Collaborative learning and small group exercises
Laboratory discussion sessions and quizzes that evaluate the proceedings weekly laboratory exercises
Individual projects
Assignments
- Reading assignments
- Lab assignments
Methods of Evaluation
- Quizzes and/or midterm and a final exam to evaluate comprehension and mastery of key terms and concepts as well as application of skills related to analysis and synthesis of computer concepts.
- Participation in lab skills exercises that demonstrate ability to critically evaluate and implement security and minimize risk in a cloud environment.
Essential Student Materials/Essential College Facilities
Essential Student Materials:Â
- AWS Free Tier Account
- Computer laboratory
Examples of Primary Texts and References
Author | Title | Publisher | Date/Edition | ISBN |
---|---|---|---|---|
AWS Online Documentation https://aws.amazon.com/documentation/ | ||||
Azure Online Documentation https://docs.microsoft.com/en-us/azure/ | ||||
AWS Cloud Security Resources https://aws.amazon.com/security/security-resources/ | ||||
Samani, Raj; Reavis, Jim; Honan, Brian. "CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security." Syngress; 1 edition (October 8, 2014) |
Examples of Supporting Texts and References
Author | Title | Publisher |
---|---|---|
Netsec subreddit: https://www.reddit.com/r/netsec/ | ||
SANS Daily Stormcast: https://isc.sans.edu/podcast.html | ||
Schneier on Security: https://www.schneier.com/ | ||
http://www.irongeek.com/ |
Learning Outcomes and Objectives
Course Objectives
- Investigate cloud environments
- Explore security fundamentals
- Explore Identity and Access Management
- Explore cloud security architectures
- Investigate resiliency and availability in the cloud
- Utilize data security and protection
- Explore utilizing and securing SAAS technologies
- Explore cloud incident response process
CSLOs
- Identify the risks in utilizing cloud services.
- Identify the steps required to secure a cloud environment.
Outline
- Investigate cloud environments
- History of cloud computing
- Types of cloud computing
- Infrastructure as a Service (IaaS)
- Platform as a service (PaaS)
- Software as a service (SaaS)
- Legacy security controls
- Benefits of cloud computing vs traditional infrastructure
- Limitations of cloud computing
- Mapping traditional infrastructure to cloud infrastructure
- Cloud computing in organizations
- Infrastructure as code
- DevOps
- Tooling
- Explore security fundamentals
- CIA triad
- Detective, Corrective, and Preventative Controls
- Policy, governance, risk, and compliance
- Network security
- Disaster recovery and availability
- Security operations
- Explore Identity and Access Management
- Key management
- Users, Groups, Roles
- Federation
- Access controls and permission
- Policies
- Explore cloud security architectures
- Detective controls
- Corrective controls
- Preventative controls
- Load balancing
- Logging
- 3rd party tools and integration
- DIY tool development
- Investigate resiliency and availability in the cloud
- Disaster recovery
- Infrastructure availability
- Application resilience and availability
- Monitoring
- Utilize data security and protection
- Cryptography
- Key and credential management
- HSMs
- PKI
- Cloud vs DIY
- Explore utilizing and securing SAAS technologies
- Access controls
- Authorization controls
- 3rd party data access and authorization
- Logging
- APIs
- Explore cloud incident response process
- Incident response policy
- Incident response planning
- Incident response procedures
Lab Topics
- Setup your cloud environment
- Create users, groups, roles, and policies
- Create networks, subnets, and instances
- Implement network security
- Implement logging and auditing
- Choose and setup a monitoring and alerting platform
- Setup load balancing and resiliency
- Conduct forensics in the cloud
- Implement corrective controls
- Create SAAS environment
- Setup SSO for your environment
- Utilize the API
- Create a simple script for automation
- Using tools to assess cloud environments