Image for

Cloud security

  • Predavanje 15
  • Vježbe 45
  • Samostalni rad 60
Ukupno 120

Naziv predmeta

Cloud security

Tip predmeta


Oznaka predmeta






Nastavnici i suradnici

Sadržaj i cilj

The module supports students learning the methods and tools used to manage information security within cloud computing confines. Security or successful protection implies understanding of both field and objects being protected. Economical, organizational, and technological aspects of cloud computing use within business confines but also in private life are objective knowledge and content necessary to understand detailed elaboration of security concepts.

Students will learn:
• the architectural concepts and demands
• how to identity, authentication and authorisation methods works.
• data and application security
• responsibilities in cloud infrastructure
• operations management, compatibility, multitenancy and
• isolation in the cloud.

The module is designed to provide knowledges related to design and implementation of security controls and threat protection, managing identity and access, and protecting data, applications, and networks in cloud and hybrid environments.


Essential reading:
1. Diogenes Y., Thomas O., (2020); Exam Ref AZ-500 Microsoft Azure Security Technologies, Redmond: Microsoft Press.
2. [Anon.], (2020). Microsoft Azure Security Technologies, Redmond: Microsoft

Recommended reading:
1. Chen, L., Takabi, H. and Le-Khac, N.A. eds., (2019). Security, privacy, and digital forensics in the cloud. New York: John Wiley and Sons.

Further reading:
1. [Anon.], (2020), Azure security documentation. Available at: https://docs.microsoft.com/en-us/azure/security/ (Accessed: 30 April 2021).

Preuzmi vodič za studente

Minimalni ishodi učenja

  • Osmisliti zaštitu za infrastrukturu u oblaku.
  • Osmisliti zaštitu identiteta u oblaku.
  • Implementiratu mehanizme zaštite resursa u oblaku.
  • Implementirati zaštitu mreže u oblaku.
  • Implementirati zaštitu virtualnih računala u oblaku.

Željeni ishodi učenja

  • Procijeniti zaštitu aplikacije u oblaku.
  • Procijeniti zaštitu identiteta u oblaku.
  • Procijeniti mehanizme zaštite resursa u oblaku.
  • Procijeniti zaštitu mreže u oblaku.
  • Procijeniti zaštitu virtualnih računala u oblaku.
Podijeli: Facebook Twitter