Cloud and Generative Artificial Intelligence Security Architectures

Harvard Extension School

CSCI E-288

Section 1

CRN 17303

View Course Details
Cloud and generative artificial intelligence (AI) represent a pivotal convergence of AI technologies and cloud-hosted services, effectively addressing the unique challenges inherent in these rapidly evolving fields. In cloud computing, security architectures are crafted to protect data, applications, and infrastructure from unauthorized access and vulnerabilities, while ensuring adherence to industry standards and regulatory requirements. The integration of generative AI adds further complexity to the security landscape, necessitating the implementation of AI-specific safeguards to protect against model vulnerabilities, prompt injection, data manipulation, and ethical concerns. This course provides an in-depth exploration of security architectural principles, design patterns, and best practices specifically tailored to the dynamic realm of cloud and generative AI services. Beginning with a comprehensive foundational overview, it delves into essential concepts and techniques crucial for designing, implementing, delivering, and managing secure cloud-based multi-tier applications and generative AI services. This includes multi-tenant networks, containers, micro-services, event-driven models, and the integration of generative AI services, utilizing foundational large language models(LLMs), retrieval augmented generation (RAG) AI knowledge bases, and AI agents. The curriculum emphasizes risk assessment and management associated with cloud and responsible AI adoption, understanding hybrid cloud network topologies, ensuring data protection through applied cryptography, and implementing end-to-end identity management, access control, monitoring, auditing, intrusion detection, incident response processes, fraud detection, and compliance with industry and regulatory standards. Upon completion, students are well-prepared to apply cloud and generative AI-based security architectures effectively.

Instructor Info

Ramesh Nagappan, MS

Principal Security Technologist, Amazon


Meeting Info

M 8:10pm - 10:10pm (9/2 - 12/20)

Participation Option: Online Asynchronous or Online Synchronous

In online asynchronous courses, you are not required to attend class at a particular time. Instead you can complete the course work on your own schedule each week.

Deadlines

Last day to register: August 28, 2025

Additional Time Commitments

Optional sections to be arranged.

Prerequisites

One of the following courses: CSCI E-7, CSCI E-12, CSCI E-33a, CSCI E-45a (offered previously), CSCI E-45b (offered previously), CSCI E-46 (offered previously), CSCI E-90, CSCI E-94, or the equivalent. Additional web application development and/or systems administration knowledge will be very helpful.

Notes

This course meets via web conference. Students may attend at the scheduled meeting time or watch recorded sessions asynchronously. Recorded sessions are typically available within a few hours of the end of class and no later than the following business day. See minimum technology requirements.

All Sections of this Course

CRN Section # Participation Option(s) Instructor Section Status Meets Term Dates
17303 1 Online Asynchronous, Online Synchronous Ramesh Nagappan Open M 8:10pm - 10:10pm
Sep 2 to Dec 20