New Solution- CMIT-280-40 Week 2: Assignment 1 – Lab 1


New Solution- CMIT-280-40 Week 2: Assignment 1 – Lab 1 – Cloud Security Mechanisms

Week 2: Assignment 1 – Lab 1 – Cloud Security Mechanisms



New Solution- CMIT-280-40 Week 2: Assignment 1 – Lab 1 – Cloud Security Mechanisms

Week 2: Assignment 1 – Lab 1 – Cloud Security Mechanisms

New Solution- CMIT-280-40 Week 2: Assignment 1 – Lab 1

CMIT-280: Cloud Computing Security


Instructor Name and Communication Options

Instructor Name:  Daniel Hembree

Preferred Email Method: Canvas Inbox

Secondary Email Method: [email protected]

Phone(s): 719-323-0748


Course Description and Prerequisites

Cloud computing has become increasingly central to Information Security (IS) strategies both at the corporate and personal level. It unifies a variety of technologies to provide businesses with a method to improve business efficiency and reduce costs. This course will  provide students with knowledge they need to approach security in the cloud. We will start with a brief introduction to cloud computing and then jump in to cloud data security, infrastructure, and application security, etc. . This course was designed using coursework from ISC2 and the Cloud Security Alliance, two of the current leaders in this area.

New Solution- CMIT-280-40 Week 2: Assignment 1 – Lab 1

Prerequisite: CMIT-130

Student-Centered Learning Outcomes

By the end of the course, students will be able to:

  • Learn the building blocks of cloud based systems.
  • Understand the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems.
  • Develop knowledge of the cloud infrastructure components, both physical and virtual, existing threats, and mitigating and developing plans to deal with those threats.
  • Ability to identify issues to ensure that the need for training and awareness in application security, the process involved with cloud software assurance and validation.
  • Understand the processes to identify critical information and the execution of selected measures that eliminate or reduce adversary exploitation of critical information.
  • Analyze the legal and compliance aspect of cloud computing security as it relates to ethical behavior and compliance with regulatory frameworks.
  • Develop a sound understanding of cloud security tools, attacks, and various penetration methods.

New Solution- CMIT-280-40 Week 2: Assignment 1 – Lab 1

Textbook(s) and Technology Requirements

Required Texts

Your eBooks can be accessed through the Champlain College Library.

For help accessing your O’Reilly eBook, please see the Champlain College Library’s O’Reilly eBook Guide.

New Solution- CMIT-280-40 Week 2: Assignment 1 – Lab 1


Technology Requirements

Please review the Technology Requirements (Links to an external site.) for Champlain College Online.

This course uses virtual machine technology. Please review the Course Overview for specific information about the technology you will be accessing for your coursework.

New Solution- CMIT-280-40 Week 2: Assignment 1 – Lab 1

Topic Outline

  • Week 1: Cloud Architecture Concepts & Design Requirements
  • Week 2: Cloud Data Security
  • Week 3: Cloud Platform and Infrastructure Security
  • Week 4: Cloud Application Security
  • Week 5: Operations
  • Week 6: Legal and Compliance
  • Week 7: Cloud Security Mechanisms

New Solution- CMIT-280-40 Week 2: Assignment 1 – Lab 1

Methods of Assessment

Your final grade will be determined based on:

Graded ElementsPercentage
Written Assignments30%
Total 100%
Extra Credit Course Evaluation1%

New Solution- CMIT-280-40 Week 2: Assignment 1 – Lab 1


Weekly discussions are an integral part of learning at Champlain College and represent a significant portion of a student’s overall grade. In order to be successful, students should:

  1. Post a thorough, well-crafted initial response that fully addresses and develops all aspects of the prompt by the due date.
  2. Engage substantively throughout the discussion period by responding to others with questions or comments that demonstrate interest, build upon the ideas of others, and encourage elaboration.
  3. Apply and integrate concepts from this course as well as from quality resources including journals, websites, readings from another class, relevant work or life experience, etc.
  4. Demonstrate attention to style, structure, grammar, etiquette, and proper citation of references to maintain academic integrity.

Discussion grades are determined using the rubric below. The descriptions show what exemplary work looks like for each aspect of an overall discussion.

Discussion Rubric
CriteriaDescriptionMax Points
ApplicationExplicitly and thoroughly explains, applies, and integrates a) concepts from this or other courses, b) outside resources or research, c) life experiences, and/or d) processes used to solve problems.30 pts
Critical ThinkingClearly articulates a desire to a) reflect, b) explore possibility, c) recognize ambiguity, d) question assumptions, and/or e) search for logical relationships among ideas. Selects, analyzes, and synthesizes relevant information to demonstrate original thinking.30 pts
CollaborationFosters collaborative learning while a) problem-solving, b) respectfully challenging others, and/or c) expanding thinking through responses and reflection with other learners throughout the week. Builds on classmate and instructor contributions to deepen the conversation.30 pts
PresentationDemonstrates attention to APA/MLA style and structure, adheres to rules of grammar and etiquette, and properly cites references to literature and course materials.10 pts
Total Points: 100



You will work through discussions and assignments related to some of the main pillars of cloud computing security, such as platform, application, and infrastructure security. We will also explore operations, legal, and compliance issues during the semester. There will also be a final assignment where students will be asked to demonstrate some of the things they have learned and apply them to a given scenario where they will document potential threats and attacks that could occur in a cloud environment.


The labs for this course were designed to provide students with practical experience identifying cloud threats and vulnerabilities. Students will have the opportunity to analyze a few different environments and apply what they have learned in the course to recommend actions/solutions. Most of the labs will be graded based on student understanding of the material and application of critical thinking to solve a problem, versus one right or wrong answer.


Student Resources & Policies

Academic Honesty Policy

Champlain College students are expected to be familiar with and adhere to the College’s policy for Academic Honesty. (Links to an external site.) Academic honesty entails creating original assignments, using your own words, and when using the words and ideas of others, documenting those sources using the method specified in this course. Our courses use plagiarism detection software. Please consult with your instructor if you are in doubt. Violations of the policy could result in a grade of F on the assignment or in the course as well as dismissal from the College.


Grading Policies

CCO Grading Policy (Links to an external site.)

Grading Scale (Links to an external site.)


Student Resources
Accessibility and Accommodations (Links to an external site.)Champ Support (Links to an external site.)
Bookstore (Links to an external site.)Library Resources (Links to an external site.)
Canvas Support (Links to an external site.)Online Tutoring (Smarthinking) (Links to an external site.)
Career Services (Links to an external site.)Student Accounts (Links to an external site.)

New Solution- CMIT-280-40 Week 2: Assignment 1 – Lab 1

Course Summary: