CSIS 690 – Summer 2016 – Syllabus


Aspen Olmsted
Course website : https://blogs.cofc.edu/olmsteda
Tel: 843.953.6600
Email: Please use olmsteda@cofc.edu with Subject = CSCI690
Office: Harbor Walk East 315
Office hours: Via Email

Class place and time

Harbor Walk East 105F MTWRF 8:30am – 12:00pm

Catalog description

CSIS 690 Applied Cyber-Security Software Penetration Testing –

The class will use a real life system to demonstrate how software should be built securely.  A sponsor organization will provide access to their enterprise cloud based solution.  The students will work together in class on the system under investigation to apply the learning done outside of class in all the domains of cyber–security.  Students in the class will document the semester-long audit in individual assignments.

Prerequisites: CSCI 221.

Course Outcomes

  • Understand how vulnerabilities exist in enterprise software
  • Develop solutions to eliminate or minimize vulnerabilities
  • Design Secure Architectures

Required text


Grading scale

100-92 (A); 91-89 (A-); 88-86 (B+); 85-82 (B); 81-79 (B-); 78-76 (C+); 75-72 (C); 71-69 (C-); 68-62 (D); else (F)

Evaluation schedule

50% Class Discussion Participation
10% Research Paper Presentation
30% Extended Abstract
10% Virtual Presentation

Class Discussion Participation

Each class we will discuss and evaluate an enterprise solution  You are expected to contribute you opinions as we work through potential vulnerabilities.

Research Paper Presentation

Each student in the class will choose a research paper.  The student will give a 10 minute presentation to the class about the research paper.

Extended Abstract and Presentation

Over the semester students will work on an individual software ethics hypothesis. The student will disseminate the results in the form of an extended abstract.  The extended abstract will be submitted to one of the following conferences:

The paper will have have the following contents:

  1. Title
  2. Your name, 2nd author name, my name
  3. Abstract
  4. Introduction
  5. Related Work
  6. Hypothesis, Implementation & Results
  7. Conclusions

Virtual Presentation

All student will produce a PowerPoint presentation (not more than 15 slides) with audio, which will be uploaded on youtube.

1. The presentation should be between 15 to 20 minutes.

2. You are expected to give a brief introduction:
a) “This presentation is for the ____________ conference”
b) Title of your presentation;
c) Your name, 2nd author name,  my name and affiliation (College of Charleston).

3. It is important to include the email address, so that participants will be able to get in touch with you if they have further questions.

Classroom disruption

Please read the College of Charlestons Student Code of Conduct. When you come to class please turn off your cell phones and all other electronic communication devices. I do encourage discussion so if you have a question do not hold back from interrupting me if you are afraid I have moved on. If it is something I will talk about a little later, I will note it on the board so we do not forget.


If you have a documented disability and are approved to receive accommodations through SNAP Services, please contact me.

Student Honor Code

I expect you to abide by the Honor Code and the Student Handbook: A Guide to Civil and Honorable Conduct. If you have a question about how to interpret the Honor Code, ask before acting! I encourage collaboration, but you must document it. Thus, each student will submit their own homework and, when collaborating, provide a reference to those people and documents consulted.

Print Friendly, PDF & Email