Go to Charter Oak State College home page
Request InfoApply Now

CSS 448: Cyberwarfare

Course Description

This course will focus on the cyberwarfare landscape, offensive and defensive cyberwarfare techniques, and the future of cyberwarfare. It also addresses military doctrine and strategies, intelligence operations, and cyberwarfare-related laws and ethics. Students will be exposed to many cybersecurity technologies, processes, and procedures that help to protect endpoints, networks, and data. They will also learn how to identify and analyze threat and vulnerabilities, and create appropriate mitigation strategies. (3 credits)

Prerequisites

  • ENG 101: English Composition 1
  • ENG 102: English Composition 2
  • ITE 145: Fundamentals of Information Systems Security OR CSS 101 Cybersecurity Fundamentals
  • ITE 220: Networking & Data Communications (Recommended)

Student Learning Outcomes (SLOs)

Students who successfully complete this course will be able to:

  1. Explain the importance of information as a military asset.
  2. Describe the targets and combatants of cyberwarfare.
  3. Explain the role of law and ethics in cyberwarfare.
  4. Describe intelligence operations in cyberwarfare.
  5. Describe cyberwarfare attackers and the evolution of cyberwarfare techniques.
  6. Describe the concept of defense-in-depth and various defense-in-depth strategies.
  7. Explain how cryptography is used in cyberwar.
  8. Explain how to defend endpoints, networks, and data.
  9. Explain how military doctrine guides the conduct of warfare.
  10. Summarize what cyberwarfare may be like in the future.

Course Activities and Grading

AssignmentsWeight

Discussions (Weeks 1-7)

8%

Assignments (Weeks 1-7)

27%

Project (Weeks 5-8)

30%

Final Exam (Week 8)

35%

Total

100%

Required Textbooks

Available through Charter Oak State College's Book Bundle

  • Chapple, Mark and David Seidl. Cyberwarfare: Information Operations in a Connected World. 2nd. ed. Burlington, MA: Jones & Bartlett, 2022. 

Course Schedule

Week

SLOs

Readings and Exercises

Assignments

1

1,2

Topics: Information as a Military Asset & Targets and Combatants

  • Readings:
    • Chapter 1
    • Chapter 2
  • Read assigned chapters
  • Participate in the Discussions
  • Submit Week 1 Assignments
    • Information in Armed Conflict
    • The U.S. Cyber Command
    • The Flame

2

3,4

Topics: Cyberwarfare, Law, Ethics and Intelligence Operations

  • Readings:
    • Chapter 3
    • Chapter 4
  • Read assigned chapters
  • Participate in the Discussions
  • Submit Week 2 Assignments
    • The Intelligence Operations Process
    • The Tallinn Manual
    • Intelligence Disciplines

3

5

Topics: Evolving Threats and Social Engineering

  • Readings:
    • Chapter 5
    • Chapter 6
  • Read assigned chapters
  • Participate in the Discussions
  • Submit Week 3 Assignments
    • Principles of Influence
    • A High Profile Hack
    • Robin Sage

4

5

Topics: Weaponizing Cyberspace and Nonstate Actors in Cyberwar

  • Readings:
    • Chapter 7
    • Chapter 8
  • Read assigned chapters
  • Participate in the Discussions
  • Submit Week 4 Assignments
    • Whistleblowers
    • Recent Cyberattacks
    • Nonstate Actor Profile

5

6,7

Topics: Defense-in-Depth Strategies and Cryptography

  • Readings:
    • Chapter 9
    • Chapter 10
  • Read assigned chapters
  • Participate in the Discussions
  • Submit Week 5 Assignments
    • Four Major Concepts of Cryptography
    • Modern CND Strategy
    • The Zeus Trojan
  • Submit Project Part 1: Identifying Cyber Threats and Applying the Cyber Kill Chain

6

8

Topics: Defending Endpoints, Networks and Data

  • Readings:
    • Chapter 11
    • Chapter 12
    • Chapter 13
  • Read assigned chapters
  • Participate in the Discussions
  • Submit Week 6 Assignments
    • Network Defense Technologies
    • Protecting Industrial Control Systems
    • NIST Cybersecurity Framework
    • Digital Rights Management Software
  • Submit Project Part 2: Ensuring Defense in Depth

7

9,10

Topics: Military Doctrine and the Future of Cyberwarfare

  • Readings:
    • Chapter 14
    • Chapter 15
  • Read assigned chapters
  • Participate in the Discussions
  • Submit Week 7 Assignments
    • The Levels of Warfare
    • Unified Land Operations
    • Chinese Military Hacking and Espionage
  • Submit Project Part 3: Examining Mission Assurance and Operational Procedures

8

1-10

Topics: Course Review and Final Examination

  • Readings:
    • Review the material from the previous weeks to prepare for Final Exam
  • Submit Project: Cyberwarfare Defense Plan Report and Presentation
  • Complete Final Exam
  • Complete the Course Evaluation

COSC Accessibility Statement

Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.

COSC Policies, Course Policies, Academic Support Services and Resources

Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.