By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare. Management of cyber incidents and conflicts requires an interdisciplinary perspective including an understanding of: 1) characteristics of the cyber threats and conflicts themselves, 2) international efforts to reduce and improve cyber security, and 3) psychological and sociopolitical factors.
The course is designed to reach an international audience and will encourage discussion on relevant current events among participants to enrich the experience with various personal and cultural perspectives on cutting-edge issues. In addition, assignments and other assessments will supplement video lectures and selected readings to ensure application of the material.
After taking this course you will be able to:
• Identify different types of actors involved in cyber threats (individuals, organizations & nation-states)
• Distinguish between different types of threats and issues in cyber security including, data theft, political espionage, critical infrastructure protection, and propaganda
• Detail the basic characteristics of the Internet infrastructure and international efforts to address Internet governance
• List several international efforts to address cyber crime and espionage
• Evaluate how principals that govern international conflicts might be applied in context of cyber security
• Apply different psychological theories of human motivation and cooperation and communication and political theories in analysis of different international issues related to cyber security including censorship, media operations and role of social technologies.
Grading:
Your grade is assessed based on discussion posts and quizzes. Individual taking this course for credit (i.e. students at the University at Albany y will be required to engage in additional activities communicated to them directly).
Recommended Background:
No background knowledge or skills are necessary, but an understanding and familiarity of cyber security, Internet infrastructure and international law would be advantageous for anyone who participates in the course.
ACKNOWLEDGEMENTS
Ersin Dincelli and Nic DePaula were the instructional designers for the course who assisted in the recording of the videos, reviewing material, creating slides, assessments and some of the content. Without their tremendous effort this would not have been possible. We also acknowledge the financial support for the recordings from the University at Albany as well as the support from Media and Marketing. Finally, thanks to Lisa Stephens who is the SUNY liaison to Coursera for being a strong supporter of the MOOC.
This module is intended to introduce you to a set of actors and motivations in the area of cyber security. After this module you will be able to identify the different threat actors and the different types of cybercrime. You will also be able to provide some preliminary analysis of cybercrime by understanding basic psychological mechanisms of motivation.
What's included
6 videos1 reading1 assignment1 discussion prompt
Show info about module content
6 videos•Total 47 minutes
Introduction to Cybercrime and Fundamental Issues•9 minutes
Evolution and Types of Cybercrime•8 minutes
Actors of Cybercrime•6 minutes
Understanding Motivated Behavior•6 minutes
Motives for Hacking•13 minutes
Cyber Attacks in a Global Context•5 minutes
1 reading•Total 10 minutes
Readings for Intro to Cybercrime•10 minutes
1 assignment•Total 30 minutes
Quiz 1: Introduction to Cybercrime•30 minutes
1 discussion prompt•Total 10 minutes
Please introduce yourself•10 minutes
Internet Governance
Module 2•2 hours to complete
Module details
This module covers technical aspects of the Internet and the domain name system, and efforts toward internet governance. After this module you should be able to define main components of the Internet infrastructure, identify the main issues in governance and compare different approaches to international internet policy.
What's included
5 videos2 readings1 assignment1 discussion prompt
Show info about module content
5 videos•Total 36 minutes
Internet Infrastructure•6 minutes
Domain Name System•7 minutes
Internet Governance•5 minutes
Importance of Internet Governance•9 minutes
Current Issues in Internet Governance•9 minutes
2 readings•Total 20 minutes
Readings for Internet Infrastructure•10 minutes
Readings for Internet Governance•10 minutes
1 assignment•Total 30 minutes
Quiz 2: Internet Governance•30 minutes
1 discussion prompt•Total 10 minutes
Discussion: Internet Governance•10 minutes
Cyberwarfare and International Conflicts
Module 3•2 hours to complete
Module details
In this module we cover the main types of attacks, actors and conflicts that may be considered aspects of cyberwarfare. After this module you will recognize the different types of cyber threats and the modes of attacks and discuss the motivations of state and non-state actors in this domain.
What's included
7 videos3 readings1 assignment1 discussion prompt
Show info about module content
7 videos•Total 43 minutes
Introduction to Cyberwarfare•5 minutes
Modes of Attacks•6 minutes
Actors of Cyberwarfare•9 minutes
Types of the Attacks•9 minutes
Motivations of the Actors•5 minutes
Future Battles: Threats to Critical Infrastructure•4 minutes
Internet Censorship•5 minutes
3 readings•Total 30 minutes
Readings for Intro to Cyberwar•10 minutes
Readings for Modes and Types•10 minutes
Readings•10 minutes
1 assignment•Total 30 minutes
Quiz 3: Cyberwarfare and International Conflicts•30 minutes
1 discussion prompt•Total 10 minutes
Discussion: Cyberwarfare and International Conflicts•10 minutes
Cyberwarfare and International Law
Module 4•2 hours to complete
Module details
This modules covers political theories and legal arrangements pertinent to cyber security. After this module you will be able to describe principles of just war, basic aspects of International Humanitarian Law and treaties. You will be able to evaluate the particularities of dealing with states and non-state actors and the potential international solutions.
What's included
5 videos3 readings1 assignment1 discussion prompt
Show info about module content
5 videos•Total 29 minutes
Principles of Just War•5 minutes
Law of Neutrality and Humanitarian Law•3 minutes
Ambiguity and Attribution•5 minutes
International Treaties•6 minutes
Characteristics of Confidence Building Measures•11 minutes
3 readings•Total 30 minutes
Readings•10 minutes
Readings•10 minutes
Readings•10 minutes
1 assignment•Total 30 minutes
Quiz 4: Cyberwarfare and International Law•30 minutes
1 discussion prompt•Total 10 minutes
Discussion: Cyber Warfare and International Law•10 minutes
Interpersonal Trust and Trust among Nations
Module 5•2 hours to complete
Module details
This module deals more specifically with psychological explanations for individual trust and trust among nations. After this module you will be able to explain how people react in situations of giving and of trust. You will also be able to identify and discuss how confidence building measures may be applied in the domain of cyber security.
What's included
5 videos2 readings1 assignment1 discussion prompt
Show info about module content
5 videos•Total 49 minutes
Ultimatum Game and Social Norms (Part 1)•10 minutes
Ultimatum Game and Social Norms (Part 2)•6 minutes
Components of Trust and Social Capital•12 minutes
Trust between Nations and Prisonner's Dilemma•10 minutes
Psychological Perspective on Confidence Building Measures•11 minutes
2 readings•Total 20 minutes
Readings for Trust•10 minutes
Readings for CBM•10 minutes
1 assignment•Total 30 minutes
Quiz 5: Interpersonal Trust and Trust among Nations•30 minutes
1 discussion prompt•Total 10 minutes
Discussion: Interpersonal Trust and Trust among Nations•10 minutes
Instructors
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe.
OK
Why people choose Coursera for their career
Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.5
1,553 reviews
5 stars
66.70%
4 stars
22.73%
3 stars
7.01%
2 stars
1.67%
1 star
1.86%
Showing 3 of 1553
C
CH
4·
Reviewed on Jul 27, 2016
Parts are thin on detail. This is a good and broad overview but lacks in-depth information of use to cyber security specialists. Still, a good course to start with if you plan to move forward.
G
GR
5·
Reviewed on Oct 8, 2021
Great course for professionals working in the filed of Cyber Crime investigation. The classes are very interactive with the question patterns.
L
LP
5·
Reviewed on Aug 15, 2020
Great course! Learned a lot about Cyber Warfare and how countries can build up trust and cooperation between themselves to tackle third party threats in the cyberspace.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I purchase the Certificate?
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.