In this module, students will explore the world of cloud security and the critical importance it holds in today's digital landscape. Students will gain an understanding of approaches to designing and implementing rigorous security strategies, complemented by monitoring and detection methodologies that provide real-time insights and proactive responses. Students will gain an understanding of Identity and Access Management (IAM) best practices, including centralized management of authentication, authorisation, roles and policies, logging and auditing.
Students will be equipped with necessary practical expertise to protect varied cloud resources such as storage services (Object, Block, File, Queue), database platforms, compute offerings (Virtual Machines, serverless functions, containers), and networking configurations (Virtual Networks, Subnets, Firewalls, VPNs). Students will develop a holistic understanding of the challenges and intricacies of securing multi-faceted cloud-hosted environments and an awareness of the encompassing compliance and regulatory landscapes. This module was developed under the Cyber Skills HCI Pillar 3 Project. Please refer to consortium agreement for ownership.
Is This Course For Me?
Open All +
Apply For Funding
We are pleased to say this course is available for funding through Tech Industry Alliance Skillnet. Check your eligibility by following these quick and easy steps.
- Apply for this course on the CyberSkills website
- Enquire with Tech Industry Alliance Skillnet if you are eligible for funding. Click Here to visit their website.
- If you are offered a place on the course, once accepting mark your employer to pay - Tech Industry Alliance Skillnet
- Enjoy the course!