This course will focus on the cyberwarfare landscape, offensive and defensive cyberwarfare techniques, and the future of cyberwarfare. It also addresses military doctrine and strategies, intelligence operations, and cyberwarfare-related laws and ethics. Students will be exposed to many cybersecurity technologies, processes, and procedures that help to protect endpoints, networks, and data. They will also learn how to identify and analyze threat and vulnerabilities, and create appropriate mitigation strategies. (3 credits)
- ENG 101: English Composition 1
- ENG 102: English Composition 2
- ITE 145: Fundamentals of Information Systems Security
- ITE 220: Networking & Data Communications (Recommended)
Student Learning Outcomes (SLOs)
Students who successfully complete this course will be able to:
- Explain the importance of information as a military asset.
- Describe the targets and combatants of cyberwarfare.
- Explain the role of law and ethics in cyberwarfare.
- Describe intelligence operations in cyberwarfare.
- Describe cyberwarfare attackers and the evolution of cyberwarfare techniques.
- Describe the concept of defense-in-depth and various defense-in-depth strategies.
- Explain how cryptography is used in cyberwar.
- Explain how to defend endpoints, networks, and data.
- Explain how military doctrine guides the conduct of warfare.
- Summarize what cyberwarfare may be like in the future.
General Education Outcomes (GEOs)
Please check the applicable GEOs for this course, if any, by outcomes at GEO Category Search, or by subject area at GEO Discipline Search.
Course Activities and Grading
Discussions (Weeks 1-7)
Assignments (Weeks 1-7)
Project (Weeks 5-8)
Final Exam (Week 8)
Available through Charter Oak State College's online bookstore
- Chapple, Mark and David Seidl. Cyberwarfare: Information Operations in a Connected World - with Cloud Labs. 2nd. ed. Burlington, MA: Jones & Bartlett, 2022. ISBN-13: 978-1-284-53723-9
- Note: This is a bundle which includes a print copy of the textbook, eBook access and Cloud Labs access required for this course. We discourage students from purchasing “used” materials from other sources due to access codes not working properly.
Readings and Exercises
Topics: Information as a Military Asset & Targets and Combatants
Topics: Cyberwarfare, Law, Ethics and Intelligence Operations
Topics: Evolving Threats and Social Engineering
Topics: Weaponizing Cyberspace and Nonstate Actors in Cyberwar
Topics: Defense-in-Depth Strategies and Cryptography
Topics: Defending Endpoints, Networks and Data
Topics: Military Doctrine and the Future of Cyberwarfare
Topics: Course Review and Final Examination
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.