We may earn an affiliate commission when you visit our partners.
Course image
Sanjay Goel and Kevin Williams

By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare. Management of cyber incidents and conflicts requires an interdisciplinary perspective including an understanding of: 1) characteristics of the cyber threats and conflicts themselves, 2) international efforts to reduce and improve cyber security, and 3) psychological and sociopolitical factors.

Read more

By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare. Management of cyber incidents and conflicts requires an interdisciplinary perspective including an understanding of: 1) characteristics of the cyber threats and conflicts themselves, 2) international efforts to reduce and improve cyber security, and 3) psychological and sociopolitical factors.

The course is designed to reach an international audience and will encourage discussion on relevant current events among participants to enrich the experience with various personal and cultural perspectives on cutting-edge issues. In addition, assignments and other assessments will supplement video lectures and selected readings to ensure application of the material.

After taking this course you will be able to:

• Identify different types of actors involved in cyber threats (individuals, organizations & nation-states)

• Distinguish between different types of threats and issues in cyber security including, data theft, political espionage, critical infrastructure protection, and propaganda

• Detail the basic characteristics of the Internet infrastructure and international efforts to address Internet governance

• List several international efforts to address cyber crime and espionage

• Evaluate how principals that govern international conflicts might be applied in context of cyber security

• Apply different psychological theories of human motivation and cooperation and communication and political theories in analysis of different international issues related to cyber security including censorship, media operations and role of social technologies.

Grading:

Your grade is assessed based on discussion posts and quizzes. Individual taking this course for credit (i.e. students at the University at Albany y will be required to engage in additional activities communicated to them directly).

Recommended Background:

No background knowledge or skills are necessary, but an understanding and familiarity of cyber security, Internet infrastructure and international law would be advantageous for anyone who participates in the course.

ACKNOWLEDGEMENTS

Ersin Dincelli and Nic DePaula were the instructional designers for the course who assisted in the recording of the videos, reviewing material, creating slides, assessments and some of the content. Without their tremendous effort this would not have been possible. We also acknowledge the financial support for the recordings from the University at Albany as well as the support from Media and Marketing. Finally, thanks to Lisa Stephens who is the SUNY liaison to Coursera for being a strong supporter of the MOOC.

Enroll now

What's inside

Syllabus

Introduction to Cybercrime
This module is intended to introduce you to a set of actors and motivations in the area of cyber security. After this module you will be able to identify the different threat actors and the different types of cybercrime. You will also be able to provide some preliminary analysis of cybercrime by understanding basic psychological mechanisms of motivation.
Read more
Internet Governance
This module covers technical aspects of the Internet and the domain name system, and efforts toward internet governance. After this module you should be able to define main components of the Internet infrastructure, identify the main issues in governance and compare different approaches to international internet policy.
Cyberwarfare and International Conflicts
In this module we cover the main types of attacks, actors and conflicts that may be considered aspects of cyberwarfare. After this module you will recognize the different types of cyber threats and the modes of attacks and discuss the motivations of state and non-state actors in this domain.
Cyberwarfare and International Law
This modules covers political theories and legal arrangements pertinent to cyber security. After this module you will be able to describe principles of just war, basic aspects of International Humanitarian Law and treaties. You will be able to evaluate the particularities of dealing with states and non-state actors and the potential international solutions.
Interpersonal Trust and Trust among Nations
This module deals more specifically with psychological explanations for individual trust and trust among nations. After this module you will be able to explain how people react in situations of giving and of trust. You will also be able to identify and discuss how confidence building measures may be applied in the domain of cyber security.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores international cyber conflicts, relevant to students of international relations and international law
Covers psychological and sociopolitical factors, important for understanding human behavior in cyber conflicts
Instructors are professors in Criminal Justice with experience in cybercrime and cyber security
May require additional activities for students taking for credit at the University at Albany
Does not require extensive experience or knowledge in cyber security to enroll
Uses video lectures, readings, and assessments to teach the material

Save this course

Save International Cyber Conflicts to your list so you can find it easily later:
Save

Reviews summary

Cyber conflicts abroad

Learners say this course on international cyber conflicts is largely positive. While learners appreciated the informative, interesting content, many noted that the class hadn't been updated in several years and broken links to recommended readings were a frequent annoyance.
Lectures are interesting and informative.
Several out of date readings.
"While informative and interesting, I believe the course hadn't been updated in a few years and some of the links to further readings didn't work."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in International Cyber Conflicts with these activities:
Review Computer Networking Concepts
Reviewing computer networking concepts will help you build a solid foundation for understanding the course material and the cyber threats that can exploit network vulnerabilities.
Browse courses on Computer Networking
Show steps
  • Review the basics of network protocols, such as TCP/IP and UDP.
  • Understand the different types of network topologies, such as star, bus, and ring.
  • Learn about the different layers of the OSI model.
  • Practice configuring and troubleshooting basic network devices, such as switches and routers.
Complete the SANS Cyber Security Essentials Tutorial
This tutorial will provide you with a comprehensive overview of cybersecurity fundamentals and help you prepare for the SANS Cybersecurity Essentials certification.
Browse courses on Cybersecurity Essentials
Show steps
  • Sign up for a free SANS account.
  • Enroll in the SANS Cyber Security Essentials Tutorial.
  • Complete the tutorial at your own pace.
Attend a Cyber Security Awareness Workshop
Attending a cyber security awareness workshop will help you learn about the latest cyber threats and how to protect yourself and your organization.
Browse courses on Cyber Security Awareness
Show steps
  • Search for cyber security awareness workshops in your area.
  • Register for a workshop that interests you.
  • Attend the workshop and participate in the activities.
Seven other activities
Expand to see all activities and additional details
Show all ten activities
Connect with Cyber Security Professionals on LinkedIn
Connecting with cyber security professionals on LinkedIn provides opportunities for networking, learning, and career advancement.
Browse courses on LinkedIn
Show steps
  • Create a LinkedIn profile.
  • Search for cyber security professionals in your industry.
  • Send connection requests to professionals who share your interests.
Follow Tutorials on Internet Governance Policies
Provides a deeper understanding of regulatory frameworks.
Browse courses on Internet Governance
Show steps
  • Identify reputable sources for online tutorials.
  • Select tutorials that cover specific policies or issues.
  • Follow the tutorials and take notes on key concepts.
Read 'Cybersecurity and Cyberwar: What Everyone Needs to Know'
This book provides a comprehensive overview of cybersecurity and cyberwarfare, and will help you understand the key concepts and challenges in this field.
Show steps
  • Read the introduction and first three chapters.
  • Summarize the main points of each chapter.
  • Identify the key concepts and challenges in cybersecurity and cyberwarfare.
Practice Cyber Threat Detection Exercises
Reinforces threat identification skills through simulated scenarios.
Show steps
  • Select a platform or tool for cyber threat detection exercises.
  • Configure the platform or tool with realistic scenarios.
  • Perform the exercises and analyze the results.
Create a Mind Map of Cyber Threats
Creating a mind map of cyber threats will help you visualize the different types of threats and how they are interconnected.
Browse courses on Cyber Threats
Show steps
  • Brainstorm a list of different cyber threats.
  • Group the threats into different categories, such as malware, phishing, and hacking.
  • Create a mind map that shows the relationships between the different threats.
Practice Solving Cyber Security Challenges on HackerRank
Solving cyber security challenges on HackerRank will help you develop your problem-solving skills and prepare for real-world cyber security scenarios.
Browse courses on Cybersecurity
Show steps
  • Sign up for a free HackerRank account.
  • Enroll in the Cyber Security Challenges track.
  • Solve as many challenges as you can.
Create a Portfolio of Your Course Materials
Compiling your course materials into a portfolio allows you to organize your learning and create a valuable resource for future reference.
Show steps
  • Gather all of your course materials, such as lecture notes, handouts, and assignments.
  • Organize your materials into a logical order.
  • Create a portfolio using a tool such as Google Drive or Dropbox.

Career center

Learners who complete International Cyber Conflicts will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information security analysts are responsible for protecting the confidentiality, integrity, and availability of information. They may also be involved in developing and implementing security policies and procedures, conducting risk assessments, and investigating security breaches. This course can help you build a foundation in information security by providing you with an understanding of the different types of cyber threats and how to protect against them.
Security Engineer
Security engineers are responsible for designing, implementing, and maintaining security systems. They may also be involved in developing and implementing security policies and procedures, conducting risk assessments, and investigating security breaches. This course can help you build a foundation in security engineering by providing you with an understanding of the different types of cyber threats and how to protect against them.
Cybersecurity Analyst
Cybersecurity analysts are responsible for protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They may also be involved in investigating cybercrimes and developing security policies and procedures. This course can help you build a foundation in cybersecurity by providing you with an understanding of the different types of cyber threats and how to protect against them.
Network Security Engineer
Network security engineers are responsible for designing, implementing, and maintaining network security systems. They may also be involved in developing and implementing security policies and procedures, conducting risk assessments, and investigating security breaches. This course can help you build a foundation in network security by providing you with an understanding of the different types of cyber threats and how to protect against them.
Cloud Security Engineer
Cloud security engineers are responsible for securing cloud computing environments. They may also be involved in developing and implementing security policies and procedures, conducting risk assessments, and investigating security breaches. This course can help you build a foundation in cloud security by providing you with an understanding of the different types of cyber threats and how to protect against them.
Digital Forensics Analyst
Digital forensics analysts are responsible for recovering and analyzing digital evidence. They may also be involved in developing and implementing security policies and procedures, conducting risk assessments, and testifying in court. This course can help you build a foundation in digital forensics by providing you with an understanding of the different types of digital evidence and how to recover and analyze it.
Cybersecurity Consultant
Cybersecurity consultants are responsible for providing cybersecurity advice and services to organizations. They may also be involved in developing and implementing security policies and procedures, conducting risk assessments, and investigating security breaches. This course can help you build a foundation in cybersecurity consulting by providing you with an understanding of the different types of cyber threats and how to protect against them.
Cybersecurity Policy Analyst
Cybersecurity policy analysts are responsible for developing and implementing cybersecurity policies and procedures. They may also be involved in conducting risk assessments, investigating security breaches, and advising policymakers on cybersecurity issues. This course can help you build a foundation in cybersecurity policy analysis by providing you with an understanding of the different types of cyber threats and how to protect against them.
Cybersecurity Manager
Cybersecurity managers are responsible for overseeing the cybersecurity program for an organization. They may also be involved in developing and implementing security policies and procedures, conducting risk assessments, and investigating security breaches. This course can help you build a foundation in cybersecurity management by providing you with an understanding of the different types of cyber threats and how to protect against them.
Cybercrime Investigator
Cybercrime investigators are responsible for investigating cybercrimes. They may also be involved in developing and implementing security policies and procedures, conducting risk assessments, and testifying in court. This course can help you build a foundation in cybercrime investigation by providing you with an understanding of the different types of cyber crimes and how to investigate them.
Information Security Auditor
Information security auditors are responsible for auditing information security systems and practices. They may also be involved in developing and implementing security policies and procedures, conducting risk assessments, and investigating security breaches. This course can help you build a foundation in information security auditing by providing you with an understanding of the different types of information security threats and how to audit them.
Cybersecurity Instructor
Cybersecurity instructors are responsible for teaching cybersecurity courses to students. They may also be involved in developing curriculum and materials, conducting research, and advising students on cybersecurity careers. This course can help you build a foundation in cybersecurity instruction by providing you with an understanding of the different types of cyber threats and how to protect against them.
Cybersecurity Researcher
Cybersecurity researchers are responsible for conducting research on cybersecurity threats and vulnerabilities. They may also be involved in developing new cybersecurity technologies and solutions. This course can help you build a foundation in cybersecurity research by providing you with an understanding of the different types of cyber threats and how to protect against them.
Cybersecurity Journalist
Cybersecurity journalists are responsible for reporting on cybersecurity issues. They may also be involved in interviewing experts, writing articles, and giving presentations on cybersecurity topics. This course can help you build a foundation in cybersecurity journalism by providing you with an understanding of the different types of cyber threats and how to protect against them.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in International Cyber Conflicts.
Provides a comprehensive overview of the intersection between cybersecurity and international relations. It explores the different types of cyber threats, the actors involved, and the policy challenges that governments face. It valuable resource for anyone who wants to understand the complex and evolving landscape of cybersecurity.
Provides a detailed look at the threat of cyber warfare and the steps that governments and businesses can take to protect themselves. It must-read for anyone who wants to understand the risks and challenges of cyber warfare.
Collection of essays that explores the ethical and legal issues surrounding cyberspace. It classic work that has helped to shape the way we think about the internet and its impact on society.
Explores the future of the internet and the challenges that it faces. It thought-provoking read that will help you to understand the potential and the perils of the internet.
Classic work that tells the story of the early days of the internet and the hackers who shaped its development. It fascinating read that will give you a deeper understanding of the roots of the internet.
Explores the history of cyber warfare and the threat that it poses to national security. It well-written and informative book that will help you to understand the challenges of defending against cyberattacks.
Provides a unique perspective on cybersecurity from the point of view of a former hacker. It fascinating read that will help you to understand the human element of cybersecurity.
Tells the story of Kevin Poulsen, one of the most famous hackers in history. It gripping read that will give you a firsthand account of the life of a hacker.
Tells the story of the pursuit and capture of Kevin Mitnick, one of the most famous hackers in history. It fascinating read that will give you a glimpse into the world of cybercrime.
Tells the story of Clifford Stoll's investigation of a computer break-in at Lawrence Berkeley National Laboratory. It fascinating read that will give you a glimpse into the world of cyber espionage.
Provides a comprehensive overview of the history of cryptography. It valuable resource for anyone who wants to understand the principles of cryptography and how they have been used throughout history.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to International Cyber Conflicts.
Digital Shield: Cybersecurity for Data and System...
Most relevant
IT Security Champion: Cyber Threat Intel and Emerging...
Most relevant
Cyber Security Basics: A Hands-on Approach
Most relevant
Introduction to Cyber Attacks
Most relevant
Cyber Security: Executive Briefing
Most relevant
Introduction to Network Security
Most relevant
Risk Management for Cyber Security Managers
Most relevant
Cyber Security for Absolute Beginners: Essential Concepts
Most relevant
Cyber Threats and Kill Chain Methodology (C|TIA Prep)
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser