Week 1 |
Introductory lecture
Introduces the module, outlining its relevance to the field and connections to other topics. It provides an overview of the content structure, key references, and assessment details. |
Week 2 |
Serverless Architecture
Discover how to build agile applications using serverless computing on AWS and Azure. Harness the power of AWS Lambda and Azure Functions to create microservices that respond to events like HTTP requests, file uploads, and message queues—all without managing servers. Understand why adopting serverless models enhances scalability, reduces operational overhead, and accelerates development cycles. By focusing on event-driven, responsive architectures, you'll learn how to deliver value rapidly while optimising resources and costs. |
Week 3 |
Secure, Responsive Microservices
Learn to develop microservices that are both responsive and secure. Implement triggers for your services using events like HTTP requests, file uploads, and message queues. Apply role-based access controls to enforce least-privilege principles, ensuring users and services have only the permissions they need. Explore secure API management with AWS API Gateway and Azure API Management to protect and monitor your endpoints. Understand how combining microservices with robust security practices enhances scalability and safeguards your applications. |
Week 4 |
File Storage and Management
Explore strategies to secure data in AWS S3 and Azure Blob Storage. Implement encryption, fine-grained access control, and lifecycle management to protect and optimise data storage. Understand the importance of access keys and bucket policies in maintaining data integrity and security. By mastering cloud storage security, you'll ensure that sensitive data remains protected while being accessible when and where it's needed. |
Week 5 |
Cloud NoSql Databases
Utilise AWS DynamoDB and Azure Cosmos DB to manage dynamic workloads effectively. Learn how automated scaling, backup, and replication ensure your applications are resilient and highly available. Discover why choosing cloud-native databases supports scalability and performance for modern applications. By integrating these databases, you'll handle vast amounts of data with ease, providing users with fast and reliable services. |
Week 6 |
Infrastructure as Code
Automate the provisioning of cloud resources using Infrastructure as Code principles with AWS CloudFormation and Azure Resource Manager. Discover how IaC promotes consistency, security, and efficiency, enabling rapid deployment and version control of infrastructure. Understand why automating infrastructure helps prevent configuration drift and allows for repeatable, auditable deployments. By mastering IaC, you'll streamline operations and enhance collaboration across teams. |
Week 7 |
Application Monitoring for Optimisation
Set up robust monitoring with AWS CloudWatch and Azure Monitor to track application health, performance, and security. Learn to configure alerts and logs to proactively address issues, ensuring optimal performance and reliability of your applications. Understand why continuous monitoring is essential for maintaining service levels and responding swiftly to anomalies. By mastering these tools, you'll keep your applications running smoothly and meet user expectations. |
Week 8 |
Multi-Cloud Strategies
Design and implement multi-cloud architectures using tools like Terraform. Optimise for factors like latency, failover, data sovereignty, and cost by managing resources across AWS and Azure. Understand how multi-cloud strategies enhance flexibility, resilience, and prevent vendor lock-in. By orchestrating resources in multiple clouds, you'll build applications that are robust, compliant, and cost-effective. |
Week 9 |
Identity and Access Control
Gain hands-on experience with Identity and Access Management (IAM) in AWS and Azure. Configure roles, policies, and access controls to enforce security best practices. Understand why strong identity management is crucial for secure cloud applications. By fortifying IAM, you'll ensure that only authorised users and services can access your resources, protecting against unauthorised access and potential breaches. |
Week 10 |
Integrated Security
Embed layered security models into your cloud-native applications. Implement encryption, access controls, and identity-based policies throughout your stack. Learn why integrating security at every layer is essential for protecting applications and data in the cloud. By adopting a defence-in-depth approach, you'll build robust applications that safeguard against a variety of threats, ensuring trust and compliance. |