Skip to content

PhD Course: Cyber Security for Cloud Computing from Zero to Hero

License

Notifications You must be signed in to change notification settings

s2n-cnit/phd-cscc02h

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

PhD STIET Cyber Security for Cloud Computing (from Zero to Hero)

About the course

Materials

# Lesson Topic
01 Introduction
02 Fundamental Network Security Concepts
03 Network security and protocols
04 Cryptography and cryptographic algorithmshttps://docs.google.com/presentation/d/1hH9CeQMHc8WMvsrNY050vMoZ6t7hlhGoOwzoeXG-L3k/edit?usp=sharing

Next lessons

# Lesson Topic
05 Systems security and vulnerabilities
06 Risk assessment and management
07 Compliance and regulatory frameworks
08 Virtualization and container security
09 Data privacy and protection
10 Identity and Access Management (IAM)
11 Cloud Service Provider (CSP) security
12 Cloud native application security
13 Security analysis and testing
14 Vulnerability discovery and exploitation
15 Threat modeling and risk assessment
16 Penetration testing and ethical hacking
17 Security incident response and forensics
18 Cloud security automation and orchestration
19 Artificial Intelligence (AI) and Machine Learning (ML) in security
20 Zero-trust security architectures
21 Internet of Things (IoT) security
22 Blockchain and distributed ledger technology security
23 Use Case Examples

Extra slides

Link here

Exams

Three possible options: theoretical, practical, and quiz.

Theoretical

Make short survey with at least 3 papers from the arxiv.org e-Print archive.

Practical

Solve at least 2 of the following exercises:

  1. Research and compare the different security protocols used in cloud computing, such as SSL/TLS, SSH, and IPSec. Write a report outlining their strengths and weaknesses and make recommendations for which one to use in different scenarios.
  2. Create a disaster recovery plan for a cloud-based infrastructure. This should include steps for backing up data, restoring systems, and ensuring data integrity in the event of a disaster.
  3. Conduct a security audit of a cloud-based application or service. This should include identifying potential vulnerabilities, testing for weak passwords or other security weaknesses, and making recommendations for improving security.
  4. Investigate the use of edge computing in the context of security. Research the benefits and drawbacks of using edge computing for security-sensitive applications, such as industrial control systems or financial systems.
  5. Develop a security strategy for a cloud-based infrastructure that includes both network-level and application-level security measures. This should include firewalls, intrusion detection and prevention systems, and encryption technologies.
  6. Research the use of blockchain technology for securing data in the cloud. Investigate the potential benefits and drawbacks of using blockchain for data storage and sharing, and make recommendations for when it would be appropriate to use.
  7. Investigate the use of machine learning and artificial intelligence in cloud security. Research the benefits and drawbacks of using these technologies for intrusion detection, threat detection, and incident response.
  8. Create a security policy for a cloud-based infrastructure. This should include guidelines for user authentication and access control, incident response procedures, and acceptable use policies.
  9. Investigate the use of zero-trust architecture in cloud security. Research the benefits and drawbacks of using a zero-trust approach, and make recommendations for when it would be appropriate to use.
  10. Research the use of network segmentation in cloud security. Investigate the benefits and drawbacks of using network segmentation, and make recommendations for when it would be appropriate to use in a cloud-based infrastructure.

Quiz

100 multiple choice questions (60% to pass the exam). Contact Alex Carrega (alessandro.carrega@unige.it) to get the link to the quiz.

About

PhD Course: Cyber Security for Cloud Computing from Zero to Hero

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published