Course website : https://blogs.cofc.edu/olmsteda
Email: Please use email@example.com with Subject = CSCI690
Office: Harbor Walk East 315
Office hours: Via Email
Class place and time
Harbor Walk East 105F MTWRF 8:30am – 12:00pm
CSIS 690 Applied Cyber-Security Software Penetration Testing –
The class will use a real life system to demonstrate how software should be built securely. A sponsor organization will provide access to their enterprise cloud based solution. The students will work together in class on the system under investigation to apply the learning done outside of class in all the domains of cyber–security. Students in the class will document the semester-long audit in individual assignments.
Prerequisites: CSCI 221.
- Understand how vulnerabilities exist in enterprise software
- Develop solutions to eliminate or minimize vulnerabilities
- Design Secure Architectures
100-92 (A); 91-89 (A-); 88-86 (B+); 85-82 (B); 81-79 (B-); 78-76 (C+); 75-72 (C); 71-69 (C-); 68-62 (D); else (F)
50% Class Discussion Participation
10% Research Paper Presentation
30% Extended Abstract
10% Virtual Presentation
Class Discussion Participation
Each class we will discuss and evaluate an enterprise solution You are expected to contribute you opinions as we work through potential vulnerabilities.
Research Paper Presentation
Each student in the class will choose a research paper. The student will give a 10 minute presentation to the class about the research paper.
Extended Abstract and Presentation
Over the semester students will work on an individual software ethics hypothesis. The student will disseminate the results in the form of an extended abstract. The extended abstract will be submitted to one of the following conferences:
- World Congress on Internet Security (WorldCIS-2016)
- The 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015)
The paper will have have the following contents:
- Your name, 2nd author name, my name
- Related Work
- Hypothesis, Implementation & Results
All student will produce a PowerPoint presentation (not more than 15 slides) with audio, which will be uploaded on youtube.
1. The presentation should be between 15 to 20 minutes.
2. You are expected to give a brief introduction:
a) “This presentation is for the ____________ conference”
b) Title of your presentation;
c) Your name, 2nd author name, my name and affiliation (College of Charleston).
3. It is important to include the email address, so that participants will be able to get in touch with you if they have further questions.
Please read the College of Charlestons Student Code of Conduct. When you come to class please turn off your cell phones and all other electronic communication devices. I do encourage discussion so if you have a question do not hold back from interrupting me if you are afraid I have moved on. If it is something I will talk about a little later, I will note it on the board so we do not forget.
If you have a documented disability and are approved to receive accommodations through SNAP Services, please contact me.
Student Honor Code
I expect you to abide by the Honor Code and the Student Handbook: A Guide to Civil and Honorable Conduct. If you have a question about how to interpret the Honor Code, ask before acting! I encourage collaboration, but you must document it. Thus, each student will submit their own homework and, when collaborating, provide a reference to those people and documents consulted.