Module Descriptors
CLOUD AND CYBER
COMP40049
Key Facts
Digital, Technology, Innovation and Business
Level 4
20 credits
Contact
Leader: Paul Wheeler
Hours of Study
Scheduled Learning and Teaching Activities: 65
Independent Study Hours: 135
Total Learning Hours: 200
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 2
  • Occurrence B, Digital Institute London, UG Semester 2
  • Occurrence C, British University Vietnam, UG Semester 2
  • Occurrence G, British University Vietnam, UG Semester 3
Sites
  • British University Vietnam
  • Digital Institute London
  • Stoke Campus
Assessment
  • GROUP ASSIGNMENT - 2000 WORDS weighted at 100%
Module Details
LEARNING STRATEGIES
All teaching sessions will blend theory and practical learning. Students will be introduced to curriculum concepts and ideas and will then be able to apply theory to practical examples within the same sessions. In addition, students will be provided with a range of resources for independent study such as case studies, academic papers, and industry stories. There will be a mixture of practical and theoretical formative (mock or practice) exercises which will help students build knowledge and confidence.
RESOURCES
University computer with suitable software

VMWare environment to generate virtual environments to experiment with software

AWS Academy Learning Environment

AWS Learner Lab Environment

Access to several Open-source sites where software can be downloaded from

Library Facilities
REFERENCE TEXTS
All texts and electronic resources will be updated and refreshed on an annual basis and available for students via the online Study Links resource platform. All reference materials will be collated and curated and aligned to Equality, Diversity & Inclusion indicators.


Chapple, M. (2018) (ISC)2 CISSP (Certified Information Systems Security Professional), 2018, John Wiley & Sons

Gogolin, G. (2021) Digital Forensics Explained, 2021, CRC press, Taylor & Francis Group

Lisdorf, (2021), Cloud Computing: A Non-Technical Introduction, Apress

Udell, W. (2019), Chan, Gupta, Implementing AWS: Design, Build, and Manage your Infrastructure, Packt

Peris, Pillai, Kudrati, (2021), Threat Hunting in the Cloud, Wiley

Franke, D, (2016) Cyber Security Basics, CreateSpace

Johnson, T.A., (2015), Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfar

IP Specialist, (2021), Google Certified Professional Cloud Network Engineer: Study Guide With Practice Questions & Labs - First Edition, Independently published

Gai, S. (2021), Building a Future-Proof Cloud Infrastructure: A Unified Architecture for Network, Security, and Storage Services, Addison-Wesley Professional; 1st edition

GM IT Academy, (2021), Fundamentals of Cyber Security and Network Security Master Guide and Interview Q&A¿Kindle Edition

Brumfield, C. (2022), Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, Wiley; 1st edition¿


We will provide access to many Whitepapers which are used by the industry to allow further study in these areas
WEB DESCRIPTOR
Computing infrastructure and the data which is stored upon this is essential to businesses from the smallest through to global enterprises. In this module we will be looking at how corporations have adapted to this changing landscape with the increased reliance on the data which is stored. As data is becoming more important, we need to ensure that everything is stored in a manner which makes it accessible within the timeframe defined by the company and to ensure that it remains secure from people both outside and inside of a company. We will look at the transition which is taking place of moving corporate data and infrastructure to a Cloud based environment and ensuring that this meets the requirements of local legalisation and locally defined security requirements. This module will make use of the Amazon Web Services (AWS) Academic Learning environment to allow students to build confidence in Cloud computing and cyber security. Additionally, we will focus on the essential concepts of cyber security through understanding Cybersecurity principles applied to services, applications, servers, Cloud, and network devices, the module will also cover incident response management, Access control, basic concepts of network security, Backup, and recovery basics, how to identify vulnerabilities and put in place safeguards, Concepts of confidentiality, integrity, and availability.
ADDITIONAL ASSESSMENT DETAILS
Assignment (a Group case study) – The case study is to plan, design and implement a Cloud solution addressing security aspects to a given scenario and considering cyber security breach event aspects of the given scenario. A number of problems will need to be discussed from the students' own investigations in order to make analysis and a series of design recommendations working within a group (Learning Outcomes 1, 2, 3 and 4).
INDICATIVE CONTENT
Within the theory we will be looking generally at the following topics within the module:

Principles and theory of both cyber and networking
Design models
Security
Cloud Networking
Loosely Coupled and Stateless systems
Security of data and the systems
Elastic Computing
Storage options
Monitoring Techniques
Cybersecurity frameworks
Infrastructure of security
Legal and ethical issues in cyber security
Information security policy and scope ISO27001 & ISO27002
Incident response management
Introduction to Cryptography
Access Control Lists (ACL) and user authentication
Security assessment and testing
Cyber event investigation (Foundation of digital forensics)
Digital forensic process
Access to industry seminars which will enhance the students' knowledge and confidence
Amazon Web Service (AWS) Cloud environment
AWS Learner Lab
Virtual machines, Windows, and Linux
Dedicated isolated Cyber labs
Security issues and features
Sources of networking and cyber research
LEARNING OUTCOMES

DEMONSTRATE AN UNDERSTANDING OF CLOUD FUNDAMENTALS

Knowledge and Understanding

2. PLAN, DESIGN AND IMPLEMENT A CLOUD-BASED SOLUTION CONSIDERING SECURITY ISSUES, PROPOSING RESOLUTION ADVICE, BEING ABLE TO IDENTIFY, ANALYSE AND EVALUATE SECURITY THREATS AND HAZARDS



Problem Solving, Communication

3. DEMONSTRATE AN UNDERSTANDING OF FUNDAMENTAL CONCEPTS OF CYBER SECURITY.

Knowledge and Understanding, Learning, Analysis, Enquiry

4. PERFORM CYBERCRIME INVESTIGATION, USING RELEVANT TOOLS.

Enquiry Problem Solving