Skip to main content Skip to navigation

WM9PG-15 Cloud & Virtualisation Security

Department
WMG
Level
Taught Postgraduate Level
Module leader
Bharath Sadasivaiah
Credit value
15
Module duration
4 weeks
Assessment
Multiple
Study location
University of Warwick main campus, Coventry

Introductory description

This module explores the cyber security implications of virtualised systems and the opportunities they present, with a particular emphasis on software containerisation technologies such as Docker. Through comparison with other virtualisation tools and techniques, the module examines trust relationships and security controls between the underlying operating system, containers or other virtualised environments, and the software running within them. Students will investigate the fundamental principle that all software executes within a specific context or container, whether as a mobile application, a laptop operating system, a cloud-hosted virtual machine, or an embedded system, and how this execution context governs behaviour, isolation, and resource access.

A core theme of the module is secure software development and the challenge of regulating resources effectively throughout the software lifecycle. Students will study how secure design, implementation, testing, and deployment practices influence the security of containerised and virtualised systems, ensuring that software is granted just enough privilege to function while preventing unintended or malicious behaviour. The module explicitly integrates principles from the Secure Software Lifecycle (SSL), emphasising security as a continuous process embedded within secure software development rather than an afterthought. Students will examine how development and lifecycle stages impact security in cloud and virtualised environments, and how evolving secure development methodologies help maintain effective controls as systems, contexts, and threat landscapes change.

Through a combination of practical experience with containerisation platforms and critical analysis of secure software development practices, the module equips students with the conceptual and technical skills needed to reason clearly about modern cyber security challenges. By aligning containerisation techniques with secure software development and lifecycle-based security principles, students will gain a systematic understanding of how to proactively mitigate risks, maintain trust across system evolution, and contribute confidently to informed cyber security decision-making in professional and interdisciplinary settings.

Module aims

This module aims to develop students’ understanding of secure software development within virtualised and containerised environments. The module aims to equip students with the knowledge and practical skills needed to analyse trust relationships, manage resource isolation, and apply Secure Software Lifecycle principles to design, develop, deploy, and maintain secure systems in cloud and virtualised contexts.

Outline syllabus

This is an indicative module outline only to give an indication of the sort of topics that may be covered. Actual sessions held may differ.

Overall context:

Secure Software Lifecycle:

  • secure design principles for virtualised and containerised environments

  • vulnerability management and patching strategies

  • security testing: static and dynamic testing

  • deployment hardening and configuration management

  • why is virtualisation and containment needed?

Development of containment in computing:

  • bare metal evolution, instruction sets, clock speed, storage, multicore
  • operating system, multitasking, scheduling, sharing and isolation
  • root jails, virtualisation, containers
  • resources: cpu cycles, storage, communications bandwidth, entropy, input, output.

Containment ecosystem:

  • host, container (guest) and sibling containers (guests)
  • virtualisation vs containerisation

Lifecycle of the provision of a service:

  • concept, specification, design, development, versioning, signing, testing, deployment, maintenance, evolution, decommissioning, timescales

Security in virtualisation and containment:

  • threats, sources, agents, vulnerabilities, exploits, vectors,
  • controls, privilege, capabilities – in host and container (guest)
  • resource separation, storage, execution, networking – in host and container (guest)

Learning outcomes

By the end of the module, students should be able to:

  • Identify and explain evolving security methodologies across the secure software lifecycle in cloud and virtualised environments. (AHEP 3.1.1, 3.1.2, 3.1.3, 3.2.3, 3.3.6, M1., M2., M3.)
  • Analyse the security relationships within a virtualised ecosystem, focusing on interactions between a virtualised container, its sibling containers, and the underlying host (AHEP 3.1.1, 3.1.2, 3.1.3, 3.2.3, M1, M2).
  • Evaluate the extent to which a virtualised container ecosystem satisfies its desired security properties (AHEP 3.1.1, 3.1.2, 3.2.3, 3.3.6, M2., M3.)
  • Configure a virtualised container ecosystem to achieve the desired security properties from the perspective of both the container and the underlying host. (AHEP 3.1.1, 3.1.2, 3.1.3, 3.2.3, 3.3.6, M1., M3.)

Indicative reading list

Reading lists can be found in Talis

Specific reading list for the module

Research element

There is a strong emphasis on the development, growth and enhancement of individual research skills so as to provide participants with the high level research knowledge, skills and competencies needed to undertake an independent, original piece of research. The module content draws upon and highlights research within the domain and the module assessment requires participants to perform further research before preparing a response to the assessment task.

Subject specific skills

Assessing security of cloud-based and virtualised systems.
Secure containerised systems design and deployment
Secure deployment of cloud-based systems
Applying secure software lifecycle principles across development and operational stages
Performing vulnerability management and patching strategies
Executing security testing (static, dynamic) for containerised and cloud systems
Hardening deployments and managing secure configurations

Transferable skills

Problem solving, critical thinking, systematic analysis, conceptual frameworks

Study time

Type Required
Supervised practical classes 30 sessions of 1 hour (20%)
Online learning (independent) 10 sessions of 1 hour (7%)
Private study 50 hours (33%)
Assessment 60 hours (40%)
Total 150 hours

Private study description

Further practical lab work and research.

Costs

No further costs have been identified for this module.

You must pass all assessment components to pass the module.

Assessment group A1
Weighting Study time Eligible for self-certification
Assessment component
Coursework 70% 42 hours Yes (extension)

Practical coursework involving the security configuration of small scale virtual ecosystem with associated critical evaluation of the process and outcome of the practical activity.

Reassessment component
Coursework No

Practical coursework involving the security configuration of small scale virtual ecosystem with associated critical evaluation of the process and outcome of the practical activity.

Assessment component
In-class test 30% 18 hours No

An in-class test assessing students’ understanding of secure lifecycle security methodologies in cloud and virtualised environments.

Reassessment component is the same
Assessment group R
Weighting Study time Eligible for self-certification
Coursework 100% 60 hours No
Feedback on assessment

Feedback will be provided via Tabula using standard WMG feedback mechanisms.

Courses

This module is Core optional for:

  • Year 1 of TWMS-H1S1 Postgraduate Taught Cyber Security Engineering (Full-time)
  • Year 1 of TWMS-H1SH Postgraduate Taught Cyber Security Management (Full-time)