Image for

Cloud security

  • Class 15
  • Practice 45
  • Independent work 60
Total 120

Course title

Cloud security

Lecture type


Course code






Lecturers and associates

Course overview

The module supports students learning the methods and tools used to manage information security within cloud computing confines. Security or successful protection implies understanding of both field and objects being protected. Economical, organizational, and technological aspects of cloud computing use within business confines but also in private life are objective knowledge and content necessary to understand detailed elaboration of security concepts.

Students will learn:
• the architectural concepts and demands
• how to identity, authentication and authorisation methods works.
• data and application security
• responsibilities in cloud infrastructure
• operations management, compatibility, multitenancy and
• isolation in the cloud.

The module is designed to provide knowledges related to design and implementation of security controls and threat protection, managing identity and access, and protecting data, applications, and networks in cloud and hybrid environments.


Essential reading:
1. Diogenes Y., Thomas O., (2020); Exam Ref AZ-500 Microsoft Azure Security Technologies, Redmond: Microsoft Press.
2. [Anon.], (2020). Microsoft Azure Security Technologies, Redmond: Microsoft

Recommended reading:
1. Chen, L., Takabi, H. and Le-Khac, N.A. eds., (2019). Security, privacy, and digital forensics in the cloud. New York: John Wiley and Sons.

Further reading:
1. [Anon.], (2020), Azure security documentation. Available at: (Accessed: 30 April 2021).

Download student guide

Minimal learning outcomes

  • Design protection for cloud infrastructure
  • Design identity protection in the cloud
  • Implement cloud resource protection mechanisms
  • Implement cloud network protection
  • Implement protection of virtual computers in the cloud

Preferred learning outcomes

  • Evaluate protection for cloud application
  • Evaluate identity protection in the cloud
  • Valorise cloud resource protection mechanisms
  • Valorise cloud network protection
  • Valorise protection of virtual computers in the cloud