About the training
In this module, students will explore the world of cloud security and the critical importance it holds in today's digital landscape. Students will gain an understanding of approaches to designing and implementing rigorous security strategies, complemented by monitoring and detection methodologies that provide real-time insights and proactive responses. Students will gain an understanding of Identity and Access Management (IAM) best practices, including centralized management of authentication, authorisation, roles and policies, logging and auditing.
Students will be equipped with necessary practical expertise to protect varied cloud resources such as storage services (Object, Block, File, Queue), database platforms, compute offerings (Virtual Machines, serverless functions, containers), and networking configurations (Virtual Networks, Subnets, Firewalls, VPNs). Students will develop a holistic understanding of the challenges and intricacies of securing multi-faceted cloud-hosted environments and an awareness of the encompassing compliance and regulatory landscapes. This module was developed under the Cyber Skills HCI Pillar 3 Project. Please refer to consortium agreement for ownership.
In this module, students will explore the world of cloud security and the critical importance it holds in today's digital landscape. Students will gain an understanding of approaches to designing and implementing rigorous security strategies, complemented by monitoring and detection methodologies that provide real-time insights and proactive responses. Students will gain an understanding of Identity and Access Management (IAM) best practices, including centralized management of authentication, authorisation, roles and policies, logging and auditing.
Students will be equipped with necessary practical expertise to protect varied cloud resources such as storage services (Object, Block, File, Queue), database platforms, compute offerings (Virtual Machines, serverless functions, containers), and networking configurations (Virtual Networks, Subnets, Firewalls, VPNs). Students will develop a holistic understanding of the challenges and intricacies of securing multi-faceted cloud-hosted environments and an awareness of the encompassing compliance and regulatory landscapes. This module was developed under the Cyber Skills HCI Pillar 3 Project. Please refer to consortium agreement for ownership.
What you will learn
Learning Outcomes
1. Examine the foundational principles of cloud security, distinguishing it from traditional IT security and the nuances of various cloud architectures and service models.
2. Recognise the role of identity and access control in cloud environments as the security perimeter in the cloud, and design strategies for effective identity management and access controls.
3. Evaluate and secure the components that comprise cloud hosted solutions ensuring the confidentiality, integrity and availability of digital assets.
4. Design and implement an overarching Cloud Security Posture Management (CSPM) strategy tailored to specific business needs and cloud architectures.
5. Examine the implications and complexities of compliance and regulatory standards in cloud security, adapting strategies to ensure adherence.
Learning Outcomes
1. Examine the foundational principles of cloud security, distinguishing it from traditional IT security and the nuances of various cloud architectures and service models.
2. Recognise the role of identity and access control in cloud environments as the security perimeter in the cloud, and design strategies for effective identity management and access controls.
3. Evaluate and secure the components that comprise cloud hosted solutions ensuring the confidentiality, integrity and availability of digital assets.
4. Design and implement an overarching Cloud Security Posture Management (CSPM) strategy tailored to specific business needs and cloud architectures.
5. Examine the implications and complexities of compliance and regulatory standards in cloud security, adapting strategies to ensure adherence.
Training information
A relevant ICT is desired and some IT experience is desired. Applications will be assessed on an individual basis.
Course Contact: Clive.jordan@mtu.ie
A relevant ICT is desired and some IT experience is desired. Applications will be assessed on an individual basis.
Course Contact: Clive.jordan@mtu.ie