GMU Logo  AIT Logo

Summer 2015

AIT 670 - Best Practices Managing Security and Privacy for Cloud Computing


This course offers a survey of security and privacy issues in Cloud Computing systems, along with an overview of current best practices and available technologies. In this course, we examine cloud computing models, look into the threat model and security issues related to data and computation outsourcing, and explore practical applications of secure Cloud Computing.


AIT 670 Textbook

Vic (J.R.) Winkler, Securing the Cloud: Cloud Computer Security Techniques and Tactics, Syngress; 1st edition (April 29, 2011). ISBN: 978-1-59749-592-9
(Available on Safari Tech Books Online, which is part of the E-Book Databases@Mason)


Credits: 3

Day/Time: Wednesday, 4:00 pm - 7:00 pm

Where: Off-campus

AIT 690 (Online) - Analysis of Recent Cyber Breaches, Business Impacts, and Defensive Recommendations


Research recent cyber breaches to allow deeper analysis of why the organization was targeted, how the attacker developed intelligence on the organization, vector used to initially breach the organization, the vulnerability attacked, and how the vulnerability was exploited.  Analyze the organization’s business impact from the cyber breach and steps the organization took to reduce this impact — or steps they should have taken to reduce the business impact.  Explore specific defensive options the organization can take to prevent future attempts of the same attack model in addition to additional specific defensive actions the organization could take to reduce the risk related to the general threat vector used.

This independent study course does not require a textbook as work will be done using open source (Internet) resources.

Credits: 3

Day/Time: Online

Where: Online

Last Updated:  May 21, 2015