Cybersecurity with Cloud Computing
Name of sponsoring organization: Malcolm Shore (Cybersecurity Expert, Former Director of GCSB)
Details of the activity: The course informs us about cloud computing concepts like SaaS (Software as a Service), IaaS (Infrastructure as a Service), and PaaS (Platform as a Service), with different deployment models that are associated with cybersecurity risks. It examines major cloud businesses like Amazon Web Services, Google Apps, and Microsoft Azure. The course also teaches us how to detect unauthorized access and how to tighten cloud security with encryption, logging, and monitoring.
What you learned: From this lesson, I have gained an understanding of how different cloud service models have specific security considerations and risk profiles. Exploring cybersecurity functions built into major platforms like Azure, AWS, and Google Applications, such as SecaaS (Security as a Service) tools, can help identify threats and enforce protections. I developed knowledge of cloud defense mechanisms like data encryption, access control, activity logging, and system monitoring.
How the activity relates to coursework or your career goals: The course has taught me a lot in both my academic and career goals. It complements my academic work by offering insights into safeguarding cloud-based systems, an area that is becoming increasingly relevant to both coursework and professional practice. It equips me with the technical foundations to evaluate and implement robust cloud security architectures in real-world environments. As for my career goals, it provides a valuable skill set to contribute effectively to cloud migration and digital transformation, ensuring deployments are both functional and secure.