CSIS 485 Cybersecurity Capstone I

This course is a comprehensive review of the computer science cybersecurity program and integrates all concepts of software cybersecurity, from a secure software development lifecycle (SDLC) point of view.

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Course Guide

View this course’s outcomes, policies, schedule, and more.*

*The information contained in our Course Guides is provided as a sample. Specific course curriculum and requirements for each course are provided by individual instructors each semester. Students should not use Course Guides to find and complete assignments, class prerequisites, or order books.


This course reinforces the concepts of resilient design, implementation and operation of software applications. The course will enable students to design and implement software that is resistant to attack and minimizes vulnerabilities. Students will also be able to demonstrate a proficiency at all levels of a secure SDLC, to include: security requirements, secure design, secure implementation, security testing, and secure operation of applications.


Textbook readings and lecture presentations

No details available.

Course Requirements Checklist

After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.

Discussions (8)

Discussions are collaborative learning experiences. Therefore, the student will create a thread in response to the provided prompt for each Discussion. Each thread main post must be at least 300 words and demonstrate course-related knowledge. In addition to the thread main post, the student will reply to the threads of at least 2 classmates. Each reply must be at least 100 words. At least 1 citation (from the text or scripture) must be included in each thread main post and the reply must contain at least 1 citation from scripture. Current APA formatting is required for any citations.

Capstone Project Assignments (5)

For the Capstone Project Assignments, the student is to pretend that he or she has been hired by a client that just developed an e-commerce web application, called Hackazon, and the client has not had any security help to this point. The application is full of vulnerabilities. In this capstone, the student will not hack this site; instead, the student will make plans to strengthen the existing application. Each Capstone Project Assignment will require an APA-formatted written report (varying in 5-6 pages of content) with a title page, bibliography, and 3 peer-reviewed scholarly sources (in addition to the course textbook).

Quiz: Mid-Term Exam

The student will complete a Mid-term Exam which will cover all the material from the first 5 chapters of the textbook. This exam will be open-book/open-notes, contain a variety of 50 multiple-choice/answer and true/false questions and have a time limit of 1 hour and 30 minutes.

Quiz: Final Exam

The student will complete a comprehensive Final Exam which will cover all the material from last 5 chapters of the text book. This exam will be open-book/open-notes, contain a variety of 50 multiple-choice/answer and true/false questions and have a time limit of 1 hour and 30 minutes.


Top 1% For Online Programs

Have questions about this course or a program?

Speak to one of our admissions specialists.