5th Sem, BD

315322: Cloud Security Syllabus for Cloud Computing & Big Data 5th Sem K Scheme MSBTE PDF

Cloud Security detailed Syllabus for Cloud Computing & Big Data (BD), K scheme PDF has been taken from the MSBTE official website and presented for the diploma students. For Subject Code, Subject Name, Lectures, Tutorial, Practical/Drawing, Credits, Theory (Max & Min) Marks, Practical (Max & Min) Marks, Total Marks, and other information, do visit full semester subjects post given below.

For all other MSBTE Cloud Computing & Big Data 5th Sem K Scheme Syllabus PDF, do visit MSBTE Cloud Computing & Big Data 5th Sem K Scheme Syllabus PDF Subjects. The detailed Syllabus for cloud security is as follows.

Rationale

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

Students will be able to achieve & demonstrate the following COs on completion of course based learning

  1. Identify and Mitigate Cloud-Specific Vulnerabilities
  2. Implement Infrastructure Security at different levels.
  3. Apply the concept of Data Security and Data Storage.
  4. Evaluate IAM Standards and Protocols
  5. Mange security in Cloud.

Unit I

Fundamentals of Cloud Security 1.1 Importance of Cloud Security 1.2 Cloud Security Challenges 1.3 Common Cloud Threats: Data Breaches, Account Hijacking, Insider Threats 1.4 Cloud-Specific Vulnerabilities: Misconfigurations, API Exploits 1.5 Cloud Security Services 1.6 Secure Cloud Software Requirement

Suggested Learning Pedagogie
Lecture Using Chalk-Board Case Study Presentations

Unit II

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Unit III

Data Security and Storage 3.1 Data lifecycle in Cloud 3.2 Data Security Principles 3.3 Data Security strategies(Encryption, Tokenization, Masking) 3.4 Data Loss Prevention(DLP): policies and tools 3.5 Data Storage Technologies : Object Storage, Block Storage, File Storage 3.6 Securing File Storage : Securing Amazon Elastic File System, Securing Azure Files, Securing Google Filestore 3.7 Backup and Recovery

Suggested Learning Pedagogie
Lecture Using Chalk-Board Presentations Video Demonstrations

Unit IV

Identity And Access Management 4.1 Trust Boundaries and IAM 4.2 IAM Definitions ,IAM Challenges , IAM Architecture 4.3 Relevant IAM Standards and Protocols for Cloud Services: IAM Standards and Specifications for Organizations, IAM Standards, Protocols, and Specifications for Consumers, Comparison of Enterprise and Consumer Authentication Standards and Protocols 4.4 IAM Practices in the Cloud: Cloud Identity Administration, Federated Identity (SSO) 4.5 Cloud Authorization Management: IAM Support for Compliance Management 4.6 Cloud Service Provider IAM Practice: SaaS,PaaS,IaaS

Suggested Learning Pedagogie
Lecture Using Chalk-Board Presentations Video Demonstrations

Unit V

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

List of Experiments:

  1. *Create a cloud environment using a public cloud provider (e.g., AWS, Azure, GCP) and set up resources. Run a simulated attack (e.g., using penetration testing tools like Metasploit) and evaluate the impact of compromised data on business operations.
  2. Set up a multi-cloud environment and identify security management complexities. Implement a centralized monitoring and logging tool (e.g., SIEM) and assess how well it addresses visibility and control challenges.
  3. * Set up a VPC (Virtual Private Cloud) with subnet configurations, security groups, and NACLs (Network Access Control List). Test the impact of different access control configurations on network traffic.
  4. *Develop a vulnerable cloud web application and perform penetration testing (e.g., OWASP ZAP) to identify threats like SQL injection and XSS(Cross-site scripting).
  5. Deploy an application on IaaS and apply hardening techniques (e.g., firewall, encryption). Simulate attacks and evaluate how the security controls hold up.
  6. *Implement encryption (at-rest and in-transit) using cloud-native services like AWS KMS or Azure Key Vault. Monitor how data integrity is maintained through hashing.
  7. Set up DLP policies in a cloud environment (e.g., Microsoft Information Protection) and test scenarios for blocking unauthorized data transfer.
  8. Implement access controls, encryption, and monitoring for Amazon EFS, Azure Files, and Google Filestore. Perform a security audit on the configurations.
  9. *Build a hybrid cloud IAM architecture and assess challenges like latency, user synchronization, and access controls across cloud services
  10. Deploy a cloud SSO solution across multiple cloud providers and assess the user experience and security.
  11. *Secure Docker containers using best practices (e.g., image scanning, runtime protection). Set up a Kubernetes cluster and implement network policies and secrets management.
  12. Deploy a serverless function (e.g., AWS Lambda) and enforce least privilege using IAM roles. Test for common security issues like injection and excessive permissions.

Self Learning

Micro Project

  • Prepare a report on data security principles and strategies.
  • Develop a backup and recovery plan for a hypothetical organization using cloud storage.
  • Write a case study on IAM practices in the cloud.
  • A fresh method for Risk Management of E-Commerce Security in Cloud Computing Environment system
  • Case study on A fresh method for Risk Management of E-Commerce Security in Cloud Computing Environment system
  • Create a detailed guide on access control mechanisms in cloud environments.

Assignment

  • Solve assignment covering all COs given by teacher

Laboratory Equipment

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Learning Materials

  1. Tim Mather, Subra Kumaraswamy, and Shahed Latif Cloud Security and Privacy O’Reilly Media, ISBN: 9780596802769
  2. Ronald L. Krutz, Russell Dean Vines Cloud Security: A Comprehensive Guide to Secure Cloud Computing Wiley Publishing, ISBN: 9780470589878
  3. Chris Dotson Practical Cloud Security: A Guide for Secure Design and Deployment O’Reilly Media, Inc, 2019 ISBN 149203746X, 9781492037460
  4. Naresh Kumar Sehgal , Pramod Chandra P. Bhatt , John M. Acken Cloud Computing with Security and Scalability Springer Cham Hardcover ISBN978-3-031-07241-3 Softcover ISBN978-3-031-07244-4

Learning Websites

  1. https://www.aquasec.com/cloud-native-academy/cspm/cloud-infr astructure-security/ Infrastructure Security
  2. https://cloudacademy.com/learning-paths/az-104-exam-preparat ion-microsoft-azure-administrator-1-1332/ Azure Security
  3. https://www.ibm.com/in-en/topics/cloud-security Cloud Security
  4. https://learn.microsoft.com/en-us/azure/security/fundamental s/services-technologies Cloud Security
  5. https://www.uniprint.net/en/cloud-security-management-8-step s/ cloud security management

For detail Syllabus of all other subjects of Cloud Computing & Big Data, K scheme do visit Cloud Computing & Big Data 5th Sem Syllabus for K scheme.

For all Cloud Computing & Big Data results, visit MSBTE Cloud Computing & Big Data all semester results direct links.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.