Learning outcome
1.1

Strategy and planning

1.2

Security and privacy

1.3

Governance, risk and compliance

1.4

Advice and guidance

2.5

Change implementation

2.6

Change analysis

2.7

Change planning

3.8

Systems development

3.9

Data and analytics

3.10

User experience

3.11

Content management

3.12

Computational science

4.13

Technology management

4.14

Service management

4.15

Security services

5.16

People management

5.17

Skills management

6.18

Stakeholder management

6.19

Sales and marketing

A1

Apply the knowledge and skills acquired in this unit to manage cloud computing security threats and privacy in different organisations.

A2

Validate security policies and standards through compliance inspection.

K1

Articulate the need for cloud infrastructure, data and application security.

K2

Discuss the mobile cloud computing models and the associated security issues.

K3

Analyse key elements associated with cloud computing security and privacy.

K4

Discuss and reflect on cloud security industry standards, policies and compliance.

S1

Critically evaluate various types of security threats in mobile cloud computing.

S2

Distinguish different levels of security needs for cloud computing.

S3

Compose security and privacy governance policies for the cloud applications used in different organisations.

Learning outcome
1.1

ICT Fundamentals

1.2

ICT Infrastructure

1.3

Information & Data Science and Engineering

1.4

Computational Science and Engineering

1.5

Application Systems

1.6

Cyber Security

1.7

ICT Projects

1.8

ICT Management and Governance

2.1

Professional ICT Ethics

2.2

Impacts of ICT

2.3

Working Individually and in ICT development teams

2.4

Professional Communication

2.5

The Professional ICT Practitioner

A1

Apply the knowledge and skills acquired in this unit to manage cloud computing security threats and privacy in different organisations.

A2

Validate security policies and standards through compliance inspection.

K1

Articulate the need for cloud infrastructure, data and application security.

K2

Discuss the mobile cloud computing models and the associated security issues.

K3

Analyse key elements associated with cloud computing security and privacy.

K4

Discuss and reflect on cloud security industry standards, policies and compliance.

S1

Critically evaluate various types of security threats in mobile cloud computing.

S2

Distinguish different levels of security needs for cloud computing.

S3

Compose security and privacy governance policies for the cloud applications used in different organisations.