Embracing Failure as a Path to Success
Embrace failure intelligently like Thomas Edison did, viewing mistakes as stepping stones to growth. Discover the mindset differences between those who believe in fixed abilities versus those who value effort and development through challenges.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Introduction to the Course AIT 670 Best Practices Managing Security and Privacy for Cloud Computing Dr. Massimiliano Albanese The content of this series of presentations is adapted from Securing the Cloud , by Vic (J.R.) Winkler
Aim of the Course Contents Examine the Cloud Computing model Cover security and privacy issues in Cloud Computing Provide an overview of current best practices and available technologies Skills Focus on applicative aspects Ability to compare alternative security solutions, and make informed decisions about an organization s computing and security infrastructure 2
Textbook & Additional Materials Securing the Cloud Vic (J.R.) Winkler ISBN: 9781597495929 Syngress, 2011 This textbook is available electronically in the Safari Tech Books collection, through GMU Libraries: http://proquest.safaribooksonline.com.mutex.gmu.edu/ Additional recommended readings will be provided by the instructor, as needed Students are also encouraged to read and comment on cloud computing and cloud security related news during the semester 3
Schedule of Classes 1. [08-31-2015] - Introduction to the course - Lecture 1: Introduction to cloud computing (Chapter 1) [Self Study] - Lecture 2: Overview of networking concepts [09-14-2015] - Lecture 3: Overview of security concepts [09-21-2015] - Lecture 4: Cloud computing architecture (Chapter 2) [09-28-2015] - Lecture 5: Security Concerns and legal aspects (Chapter 3) [10-05-2015] - Lecture 6: Securing the cloud: architecture (Chapter 4) - Review session [10-12-2015] - Mid-term exam [10-19-2015] - Lecture 7: Securing the cloud: data (Chapter 5) [10-26-2015] - Lecture 8: Securing the cloud: key strategies and best practices (Chapter 6) [11-02-2015] - Lecture 9: Security criteria: building an internal cloud (Chapter 7) [11-09-2015] - Lecture 10: Security criteria: selecting an external cloud provider (Chapter 8) [11-16-2015] - Lecture 11: Evaluating cloud security: an information security framework (Chapter 9) [11-23-2015] - Lecture 12: Operating a cloud (Chapter 10) - Review session [11-30-2015] - Student presentations (1/2) [12-07-2015] - Student presentations (2/2) [12-14-2015] - Final exam 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 4
Grading Breakdown by Class Activity Activity Points Class participation ( class attendance) 150 Mid-term exam 150 Presentation 100 Term paper (waived for students passing the CCSK by 12/1/2015) 150 Final exam 150 Total 700 Detailed instructions for student presentations and term papers will be posted on Blackboard in mid-October 5
Grading Letter Grades Point % range 97% - 100% 93% - 96.9% 90% - 92.9% 87% - 89.9% 83% - 86.9% 80% - 82.9% 77% - 79.9% 73% - 76.9% 0% - 72.9% Letter grade A+ A A- B+ B B- C+ C F 6
Grading Extra Credits Students who wish to recover credits lost in other course activities can volunteer to give short presentations 4-5 content slides 8-10 minutes Topic of their choice: must be approved by the instructor A request must be sent to the instructor one week before the intended presentation date, and slides must be submitted by 3pm on the day of the presentation. Up to 30 points earned per presentation Maximum of two presentations per student during the entire course 7
Certificate of Cloud Security Knowledge The Certificate of Cloud Security Knowledge (CCSK) provides evidence that an individual has successfully completed an examination covering the key concepts of the CSA guidance and ENISA whitepaper Security Guidance for Critical Areas of Focus in Cloud Computing, V3 Cloud Computing: Benefits, Risks and Recommendations for Information Security The CCSK examination costs $345.00, effective May 1, 2013 This entitles you to attempt the test up to two times If necessary, additional test attempts can be purchased for $345.00 each 8
Class Tools Blackboard Class materials Piazza Discussion platform focused on getting help fast and efficiently from classmates and instructors https://piazza.com/gmu/fall2015/ait670/ Office hours By appointment, at a mutually convenient time or before class Research Hall, Suite 417 Nguyen Engineering Building, Room 5350 9
Discussion Question In each lecture, there will be one or more slides like this one, with questions intended to promote class discussion 10
Questions? 11