|
(W00) Course Instructions |
|
00:00:00 |
Module 1 |
|
(W27M01) Module 1 Introduction |
|
00:00:00 |
|
(W27M02) Additional Resources |
|
00:00:00 |
|
(W27M03) Approaches necessary in evaluating cloud systems with effective forensics - resources |
|
00:00:00 |
|
(W27A01) Module 1 Exercise |
30, 00:00 |
Module 2 |
|
(W27M05) Module 2: Architecture of the cloud |
|
00:00:00 |
|
(W27M06) Architecture of the cloud - continued |
|
00:00:00 |
|
(W27M07) Guidance and Recommendations |
|
00:00:00 |
|
(W27A02) Exercise on Cloud Architecture |
30, 00:00 |
Module 3 |
|
(W27M09) Trusted computing - Module Notes |
|
00:00:00 |
|
(W27M10) Trusted cloud modelling - readings |
|
00:00:00 |
|
(W27M11) Reading: The Clark-Wilson Security Model - reading |
|
00:00:00 |
|
(W27M12) Brewer and Nash Model - reading |
|
00:00:00 |
|
(W27A03) Exercise on trusted computing |
30, 00:00 |
Module 4 |
|
(W27M14) Module 4 notes - Security in the cloud |
|
00:00:00 |
|
(W27M15) Security and testing in the cloud - Reading |
|
00:00:00 |
|
(W27A04) Exercise on cloud security |
30, 00:00 |
Module 5 |
|
(W27M17) Module 5 Notes |
|
00:00:00 |
|
(W27M18) Module 5 Reading |
|
00:00:00 |
|
(W27M19) Selected recommendations from the Clouse Security Alliance (CSA) |
|
00:00:00 |
|
(W27M20) Course Summary |
|
00:00:00 |
Final Exam |
|
(W27Q01) Final Test |
|
00:20:00 |
|