Information And Actions Being Taken Related To COVID-19
The Military College of South Carolina
give online buttongive online button apply now buttonapply now button

CSCI 427: Advanced Cybersecurity

Course Description:

CSCI 427 Advanced Cybersecurity Three Credit Hours
Prerequisite: CSCI 327
This course will cover the techniques used to secure cybersystems. Topics covered will include security policies, computer security management and risk assessment, secured network protocols, software security issues, ethical and legal aspects of cybersecurity, and disaster recovery. Special emphasis will be given to designing, deploying, and managing complete secured cybersystems.

Major Topics:

  • Basic of attacks and defense mechanisms
  • Secure OS installation, hardening and system administration
  • Vulnerability Analysis
  • Intrusion Detection
  • Firewalls and VPNs
  • Intrusion Detection and Prevention Systems
  • Denial of Service Attacks
  • Buffer Overflow
  • Software Security
  • Legal, Ethical, and Professional Issues in Information Security
  • Planning for Security
  • Security Management and Risk Assessment
  • Security Controls, Plans and Procedures
  • Physical and Infrastructure Security and Human Resources Security

Course Outcomes:

Upon successful completion of this course, a student will be able to

  • Identify different types of attacks in the cyberspace and compare and contrast their resources, capabilities/techniques and motivations;
  • Describe different types of attacks and their characteristics;
  • Examine the architecture of typical, complex system and identify vulnerabilities
  • Install and configure OS successfully and perform system administration activities which include setting up user accounts, configuring authentication policies, installing patches, peforming backups and restoring the system from backup;
  • List Perform OS hardening activities which include removing unnecessary components, closing unnecessary ports, perform vulnerability scan, install patches and updates;
  • Apply different tools for network defense;
  • Use network monitoring and mapping tools;
  • Analyze secured software practices;
  • Understand the legal and ethical issues of cybersecurity;
  • List the applicable laws and policies related to cybersecurity;
  • Perform basic risk assessment for cybersystems,
  • Describe various controls for addressing risks, and
  • Describe role of management in developing and maintaining cybersecurity policy


Principles of Information Security, Michael E. Whitman and Herbert J. Mattord, Course Technology

Hands-On Information Security Lab Manual, Michael E. Whitman and Herbert J. Mattord, Course Technology

Computer Security: Principles and Practices (2nd Edition), William Stallings and Lawrie Brown, Pearson

Introduction to Computer Security, Matt Bishop, Addison-Wesley

Virtual Lab - iLab

Projected Schedule:

Every Other Spring (Odd Calendar Years)

Recent Syllabi:

Spring 2015, Banik

Back to Top