{"id":7954,"date":"2024-04-04T11:26:26","date_gmt":"2024-04-04T11:26:26","guid":{"rendered":"https:\/\/www.inspirenignite.com\/kl\/6281a-virtualization-and-cloud-security-syllabus-for-cyber-forensics-information-security-6th-sem-2021-revision-sitttr-professional-elective-iii\/"},"modified":"2024-04-04T11:26:26","modified_gmt":"2024-04-04T11:26:26","slug":"6281a-virtualization-and-cloud-security-syllabus-for-cyber-forensics-information-security-6th-sem-2021-revision-sitttr-professional-elective-iii","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/kl\/6281a-virtualization-and-cloud-security-syllabus-for-cyber-forensics-information-security-6th-sem-2021-revision-sitttr-professional-elective-iii\/","title":{"rendered":"6281A: Virtualization and Cloud Security Syllabus for Cyber Forensics &amp; Information Security 6th Sem 2021 Revision SITTTR (Professional Elective-III)"},"content":{"rendered":"<p align=\"justify\">Virtualization and Cloud Security detailed syllabus for Cyber Forensics &amp; Information Security (CF) for 2021 revision curriculum has been taken from the <a class=\"rank-math-link\" href=\"http:\/\/www.sitttrkerala.ac.in\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">SITTTRs<\/a> official website and presented for the Cyber Forensics &amp; Information Security (CF) students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Cyber Forensics &amp; Information Security 6th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/sitttr-diploma-cyber-forensics-information-security-cf-syllabus-for-6th-sem-2021-revision\">Cyber Forensics &amp; Information Security (CF) 6th Sem 2021 regulation scheme<\/a>. For Professional Elective-III scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/sitttr-cyber-forensics-information-security-6th-sem-professional-elective-iii-syllabus-2021-revision\">Cyber Forensics &amp; Information Security (CF) Professional Elective-III syllabus scheme<\/a>. The detailed syllabus of virtualization and cloud security is as follows. <\/p>\n<p><h4>Course Objectives:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2715-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>. <\/p>\n<p><h4>Course Outcomes:<\/h4>\n<p>On completion of the course student will be able to:<\/p>\n<ol>\n<li>Describe the concept of virtualization and its properties.<\/li>\n<li>Describe various types of virtualization<\/li>\n<li>Describe the architecture and characteristics of cloud computing<\/li>\n<li>Illustrate security mechanisms in cloud computing applications.<\/li>\n<\/ol>\n<p><h4>Module 1:<\/h4>\n<p>Overview of virtualization: &#8211; Concept of Virtualization, Virtualization Types &#8211; Desktop Virtualization &#8211; Network virtualization &#8211; Server and Machine Virtualization &#8211; Storage Virtualization &#8211; System-level or Operating Virtualization &#8211; Application Virtualization. Basics of virtual machine, Types of virtual machines. Hypervisor &#8211; Key Concepts-Types of Hypervisors. Virtualization Advantages and Disadvantages.\n<\/p>\n<p><h4>Module 2:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2715-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>. <\/p>\n<p><h4>Module 4:<\/h4>\n<p>Cloud Security: &#8211; Security architecture &#8211; Security Planning, Cloud Security Alliances (CSA) model, Data Security-Secure isolation, Infrastructure Security Services &#8211; Application Security Services-Identity security services, Threats to a cloud security architecture\n<\/p>\n<p><h4>Text Books:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2715-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>. <\/p>\n<ol>\n<li>Matthew Portnoy , Virtualization Essentials, 2nd Edition<\/li>\n<li>A. Amali Angel Punitha, S. Sureshkumar, A. Peter Soosai Anandaraj, Introduction to Cloud Computing<\/li>\n<li>Ronald L. Krutz, Russell Dean Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing<\/li>\n<\/ol>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>Dan Kusnetzky, Virtualization: A Manager&#8217;s Guide<\/li>\n<li>Chris Wolf , Erick M. Halter, Virtualization From the Desktop to the Enterprise<\/li>\n<li>Dac-Nhuong Le, Raghvendra Kumar, Nguyen Gia Nhu, Jyotir Moy Chatterjee, Cloud Computing and Virtualization.<\/li>\n<li>James Wilson, An Introduction to Cloud Computing<\/li>\n<li>Toby Velte, Anthony Velte, Robert Elsenpeter, Cloud Computing, A Practical Approach<\/li>\n<li>John W. Rittinghouse, James F. Ransome, Cloud Computing Implementation, Management, and Security<\/li>\n<\/ol>\n<p><h4>Online Resources<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2715-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>. <\/p>\n<p align=\"justify\">For detailed syllabus of all other subjects of Cyber Forensics &amp; Information Security, 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/sitttr\/cf\">Cyber Forensics &amp; Information Security (CF) 6th Sem subject syllabuses for 2021 revision<\/a>. <\/p>\n<p align=\"justify\">To see the syllabus of all other branches of diploma 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-syllabus\/\"> SITTTR diploma all branches syllabus.<\/a>. <\/p>\n<p align=\"justify\">To see the results of Cyber Forensics &amp; Information Security of diploma 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-results\/\"> SITTTR diploma results.<\/a>. <\/p>\n<p align=\"justify\">For all Cyber Forensics &amp; Information Security academic calendars, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-academic-calendar\/\"> Cyber Forensics &amp; Information Security all semesters academic calendar<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Virtualization and Cloud Security detailed syllabus for Cyber Forensics &amp; Information Security (CF) for 2021 revision curriculum has been taken from the SITTTRs official website and presented for the Cyber [&hellip;]<\/p>\n","protected":false},"author":2462,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[79],"tags":[],"class_list":["post-7954","post","type-post","status-publish","format-standard","hentry","category-cf"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/7954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/users\/2462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/comments?post=7954"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/7954\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/media?parent=7954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/categories?post=7954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/tags?post=7954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}