Loading...

Course Description

As organizations increasingly rely on cloud computing, understanding and mitigating modern security threats is essential for IT professionals. This course provides an introduction to security issues in modern computing systems and platforms, with a particular focus on cloud computing environments. You will examine common causes of security breaches and learn methods to detect, isolate, and prevent them effectively.

By the end of this course, you will be able to identify common attack vectors in modern cloud environments and evaluate the effectiveness and limitations of security features offered by operating systems, compilers, and hardware.

Using a simulated lab environment, you will build practical skills in identifying vulnerabilities, applying tools and techniques for bug detection and sandboxing, and exploring the latest advancements in hardware security.

This nine-week course includes:

  • A one-hour live orientation session
  • Weekly optional drop-in Q&A sessions with the instructor
  • Weekly online learning and hands-on lab activities

Overview

  • Cutting-edge content: Dive into the latest cybersecurity challenges, tools, and techniques that address emerging threats and vulnerabilities in modern systems and cloud environments. This course provides practical skills rooted in the most current advancements in the field.
  • Focus on critical topics: Build expertise in three critical areas of:
    • Program security: Learn to identify vulnerabilities, attack vectors, and mitigation techniques to safeguard software systems.
    • Operating system security: Understand OS security risks and implement processes to protect against threats.
    • Hardware security: Explore cutting-edge hardware-based security capabilities that enhance overall system protection.
  • Practical lab-based learning: Experience the impact of common vulnerabilities and attacks through hands-on labs, explore sandbox evasion and access control, familiarize yourself with commonly used tools for bug finding, and learn more about the latest hardware security technologies.
  • Showcase your learning: Summarize your learning by creating a detailed plan to implement multi-layered security controls in your organization, addressing real-world challenges with the strategies and techniques gained from the course.
  • Flexible learning experience: Progress at your own pace with a generous timeline for tasks and detailed lab guides. Recorded orientation sessions provide additional flexibility for busy schedules.
  • Expert support: Connect with your instructor through weekly live Q&A sessions and actively monitored discussion forums. Receive personalized guidance to enhance your learning experience and address challenges as they arise.

System requirements

  • Students will use the online CloudLabs platform to complete the hands-on labs. No software installation needed. 

Who Should Enrol

This course is for mid-career professionals looking to specialize in cloud security to stay competitive, improve job prospects, and earn certifications that are increasingly in demand within modern tech ecosystems.  

  • Programmers/Developers: As cloud platforms become more integral to software deployment, understanding cloud-specific security measures ensures their code is resilient to vulnerabilities, integrates secure development practices, and complies with industry standards.  
  • Cybersecurity Professionals: The shift to cloud computing introduces new security challenges such as data privacy, access control, and securing distributed infrastructure. Mastering cloud security helps them mitigate emerging threats, improve cloud incident response, and safeguard critical assets.  
  • IT Professionals: Managing and securing cloud infrastructures requires specialized knowledge of how to protect cloud platforms and data. This course equips them with the skills to maintain secure cloud operations, monitor environments for security breaches, and implement compliance frameworks. 

What You Will Learn

  • Explain the risks associated with cloud infrastructure and platforms 
  • Identify attack vectors for virtual machines or cloud-based applications 
  • Articulate how endpoint security helps mitigate attacks 
  • Demonstrate how to design secure authentication and access control schemes 
  • Describe security features provided in modern operating systems 
  • Describe how to augment the security of cloud applications automatically 
  • Model how to find vulnerabilities with state-of-the-art tools 
  • List state-of-the-art hardware-assisted security techniques 
  • Analyse potential side-channels in hardware and discuss fixes for them 
  • Summarise how to plan and implement security controls in cloud setting

Module Title  

Main Topics / Learning Outcomes 

Module 1: Introduction to Systems and Platform Security 

  • Introduction to systems and platform security 
  • Goals of security 
  • Key terms in cybersecurity 

Module 2: Common Attack Vectors 

  • Memory errors 
  • Race conditions 
  • Malformed user input 

Module 3: Security Features in Operating Systems 

  • Security systems in operating systems 
  • Resource isolation 
  • Sandboxing 
  • Whole-system virtualization and emulation 
  • Container technology 
  • Authentication and access control 

Module 4: Compiler-Assisted Security 

  • Program hardening 
  • Stack canaries and LLVM sanitizer suite 
  • Automated bug finding 
  • Fuzz testing and symbolic execution 
  • Workflows of AFL and KLEE 

Module 5: Hardware-Assisted Security 

  • Hardware security module for cloud 
  • Trusted execution environment 
  • Side-channel attacks and defenses 
Loading...
Enroll Now - Select a section to enroll in
Section Title
Systems and Platform Security in Practice
Type
Online
Dates
May 05, 2025 to Jul 06, 2025
Course Fee(s)
Course Fee non-credit $995.00
Required fields are indicated by .