Programplaner og emneplaner - Student
PENG9550 Cloud Computing and Security Course description
- Course name in Norwegian
- Cloud Computing and Security
- Weight
- 10.0 ECTS
- Year of study
- 2022/2023
- Course history
-
- Curriculum
-
SPRING 2023
FALL 2022
- Schedule
- Programme description
-
Introduction
Introductory module:
- Principles of modelling and derivation of mathematical models
- Analysis of ordinary differential equations (ODEs)
- Linear partial differential equations (PDEs)
- Prominent results from functional analysis and their application to ODEs and PDEs
- Numerical methods for computing of solutions of PDEs
Functional analysis:
- Completeness for normed spaces
- Hilbert spaces, compact and diagonalisable operators
- Theory of topological vector spaces
- Test functions, distributions and the Fourier transform
- Sobolev spaces and fundamental solutions of partial differential equations
Biosystems:
- Mathematical models for biological systems
- Analytical and numerical methods for simulation of system response
- Actuators and sensors for stimulation and measurements of biological systems
- Interaction of biological and measurement system
Modern physics:
- Monte Carlo techniques
- Splines and other expansion techniques
- Applications of expansions in spherical harmonics
- Numerical problems in general relativity and quantum physics
- Manifolds with geometric structures central to physics and engineering.
Within all specializations, the content may be adjusted to accommodate for the research area of each PhD candidate.
-
Recommended preliminary courses
Basic background in computer science and networking.
-
Learning outcomes
Students who complete the course are expected to have the following learning outcomes, defined in terms of knowledge, skills and general competence:
Knowledge
On successful completion of the course, the student:
- has a deep understanding of how cloud computing, large services and infrastructures play a crucial role in todays digitised society;
- has an interdisciplinary view on cloud computing due to its central role in the digitised society;
- understands the fundamental principles of distributed computing and particularly cloud computing;
- understands the importance of virtualisation in distributed computing and how this has enabled the development of cloud computing;
- understands the business models that underlie cloud computing;
- has an understanding of the architecture and concept of different cloud models: IaaS, PaaS, and SaaS;
- is knowledgeable in the various methods available to monitor and evaluate cloud infrastructure;
- has a deep knowledge of the common security issues in the field of cloud computing;
- has an understanding of the concept of threat intelligence in the field of cloud computing;
- understands the use of security policies as part of the overall security strategy of an organization;
Skills
On successful completion of the course, the student can:
- design highly distributed digital systems.
- create virtual machine images and deploy them on a cloud.
- design and develop scalable cloud-based applications by creating and configuring virtual machines in the cloud.
- analyse cloud infrastructures with regard to properties such as resilience, security, performance and manageability.
- identify cloud security weaknesses by recognising and discovering threats and vulnerabilities to cloud computing.
- implement cloud features to secure and harden the infrastructure.
- use tools to monitor and evaluate cloud infrastructure.
- use tools to analyse system logs to detect possible security or performance problems.
General competence
On successful completion of the course, the student:
- can discuss his/her area of expertise with a non-expert audience by combining insights across disciplines.
- can discuss and debate the impact of technological development on our society in the future
-
Content
The course describes the important enabling technologies of cloud computing, explores state- of-the art platforms and existing services, and examines the challenges and opportunities of adopting cloud computing. Moreover, the course investigates how to protect the critical data increasingly being stored in the cloud. The students learn how to build a security strategy that keeps data safe and mitigates risk.
-
Teaching and learning methods
The course is part of a series of seminars in which the students actively participate together with members of relevant research groups. The students present papers and listen to paper presentations from other PhD students and staff. The students are also expected to actively critique and challenge fellow participants. The students are provided with a sound foundation in research skills and are naturally integrated into the local research community and its research discourse.
-
Course requirements
The following required coursework must be approved before the student can take the exam:
- Three individual oral presentations of assigned publications.
- Participate as prepared discussant for three presentations by other group members.
- Independently find and study publications relevant to the research discourse.
- 80% attendance at seminars.
-
Assessment
Oral exam, 30 minutes per student.
The oral exam cannot be appealed.
-
Permitted exam materials and equipment
None.
-
Grading scale
Pass or fail.
-
Examiners
Two sensors, one from the teaching staff, the other may be internal or external. External examiner is used periodically.