Back close

Course Detail

Course Name Cloud and Infrastructure Security
Course Code 21SN632
Program M. Tech. in Cyber Security Systems & Networks
Semester Elective
Credits 3


Cloud computing essentials: – Characteristics, cloud computing models, service models, deployment models, NIST reference architecture, virtualization, containers, popular cloud platforms, open source architectures. Attacks in various layers of cloud computing. Threats classification and counter measures: – Infrastructure and host threats, service provider threats, generic threats, threats assessment, CSA Top threats. Risk in cloud computing: assessment, risk and trust models, security SLA. Protecting Data in the Cloud:- Tokenization, Cryptographic key management for data protection, homomorphic encryption. Vulnerability management: – Differences from traditional IT, vulnerable areas, finding and fixing vulnerabilities. Cloud computing security architecture: – general issues, trusted cloud computing platform, identity management and access control. Cloud-centric regulatory compliance issues and mechanisms.

Lab: Familiarization of popular cloud platforms, VM creation, Container management, Storage management, Network management, Access control mechanism in computing environment,Virtual private cloud, Design and deployment of secure microservice applications, TPM, Homomorphic encryption.


  • John R. Vacca(Editor), “Cloud Computing Security – Foundations and Challenges” CRC Press, 2017
  • Ronald L. Krutz and Russell Dean Vines , “Cloud Security- A Comprehensive Guide to Secure Cloud Computing” , Wiley, 2010
  • Chris Dotson “Practical Cloud Security “, O’Reilly,2019
  • Tim Mather, S. Kumaraswamy and S. Latif, “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance”, O’Reilly Media, 2009

Course Objectives

1. Understand the architecture and infrastructure of cloud computing along with the hands-on experience in various cloud computing platforms.

2. Identify the known threats, risks, vulnerabilities, and privacy issues in the various layers of cloud computing.

3. Understand the concepts and various methods secure data management in cloud

4. Understand the security standards, tools, regulatory mandates, audit policies and compliance requirements for Cloud based infrastructures.

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now