課程信息
4.4
490 ratings
118 reviews
By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare. Management of cyber incidents and conflicts requires an interdisciplinary perspective including an understanding of: 1) characteristics of the cyber threats and conflicts themselves, 2) international efforts to reduce and improve cyber security, and 3) psychological and sociopolitical factors. The course is designed to reach an international audience and will encourage discussion on relevant current events among participants to enrich the experience with various personal and cultural perspectives on cutting-edge issues. In addition, assignments and other assessments will supplement video lectures and selected readings to ensure application of the material. After taking this course you will be able to: • Identify different types of actors involved in cyber threats (individuals, organizations & nation-states) • Distinguish between different types of threats and issues in cyber security including, data theft, political espionage, critical infrastructure protection, and propaganda • Detail the basic characteristics of the Internet infrastructure and international efforts to address Internet governance • List several international efforts to address cyber crime and espionage • Evaluate how principals that govern international conflicts might be applied in context of cyber security • Apply different psychological theories of human motivation and cooperation and communication and political theories in analysis of different international issues related to cyber security including censorship, media operations and role of social technologies. Grading: Your grade is assessed based on discussion posts and quizzes. Individual taking this course for credit (i.e. students at the University at Albany y will be required to engage in additional activities communicated to them directly). Recommended Background: No background knowledge or skills are necessary, but an understanding and familiarity of cyber security, Internet infrastructure and international law would be advantageous for anyone who participates in the course. ACKNOWLEDGEMENTS Ersin Dincelli and Nic DePaula were the instructional designers for the course who assisted in the recording of the videos, reviewing material, creating slides, assessments and some of the content. Without their tremendous effort this would not have been possible. We also acknowledge the financial support for the recordings from the University at Albany as well as the support from Media and Marketing. Finally, thanks to Lisa Stephens who is the SUNY liaison to Coursera for being a strong supporter of the MOOC....
Globe

100% 在線課程

立即開始,按照自己的計劃學習。
Calendar

可靈活調整截止日期

根據您的日程表重置截止日期。
Clock

建議:5 hours/week

完成時間大約為8 小時
Comment Dots

English

字幕:English

您將獲得的技能

CybersecurityCybercrimeCyberwarfareInternet Protocol (IP) Suite
Globe

100% 在線課程

立即開始,按照自己的計劃學習。
Calendar

可靈活調整截止日期

根據您的日程表重置截止日期。
Clock

建議:5 hours/week

完成時間大約為8 小時
Comment Dots

English

字幕:English

教學大綱 - 您將從這門課程中學到什麼

1

章節
Clock
完成時間為 1 小時

Introduction to Cybercrime

This module is intended to introduce you to a set of actors and motivations in the area of cyber security. After this module you will be able to identify the different threat actors and the different types of cybercrime. You will also be able to provide some preliminary analysis of cybercrime by understanding basic psychological mechanisms of motivation....
Reading
6 個視頻(共 47 分鐘), 1 個閱讀材料, 1 個測驗
Video6 個視頻
Evolution and Types of Cybercrime7分鐘
Actors of Cybercrime6分鐘
Understanding Motivated Behavior5分鐘
Motives for Hacking12分鐘
Cyber Attacks in a Global Context5分鐘
Reading1 個閱讀材料
Readings for Intro to Cybercrime10分鐘
Quiz1 個練習
Quiz 1: Introduction to Cybercrime20分鐘

2

章節
Clock
完成時間為 1 小時

Internet Governance

This module covers technical aspects of the Internet and the domain name system, and efforts toward internet governance. After this module you should be able to define main components of the Internet infrastructure, identify the main issues in governance and compare different approaches to international internet policy....
Reading
5 個視頻(共 36 分鐘), 2 個閱讀材料, 1 個測驗
Video5 個視頻
Domain Name System6分鐘
Internet Governance5分鐘
Importance of Internet Governance8分鐘
Current Issues in Internet Governance8分鐘
Reading2 個閱讀材料
Readings for Internet Infrastructure10分鐘
Readings for Internet Governance10分鐘
Quiz1 個練習
Quiz 2: Internet Governance20分鐘

3

章節
Clock
完成時間為 2 小時

Cyberwarfare and International Conflicts

In this module we cover the main types of attacks, actors and conflicts that may be considered aspects of cyberwarfare. After this module you will recognize the different types of cyber threats and the modes of attacks and discuss the motivations of state and non-state actors in this domain....
Reading
7 個視頻(共 43 分鐘), 3 個閱讀材料, 1 個測驗
Video7 個視頻
Modes of Attacks6分鐘
Actors of Cyberwarfare8分鐘
Types of the Attacks8分鐘
Motivations of the Actors5分鐘
Future Battles: Threats to Critical Infrastructure4分鐘
Internet Censorship5分鐘
Reading3 個閱讀材料
Readings for Intro to Cyberwar10分鐘
Readings for Modes and Types10分鐘
Readings10分鐘
Quiz1 個練習
Quiz 3: Cyberwarfare and International Conflicts20分鐘

4

章節
Clock
完成時間為 1 小時

Cyberwarfare and International Law

This modules covers political theories and legal arrangements pertinent to cyber security. After this module you will be able to describe principles of just war, basic aspects of International Humanitarian Law and treaties. You will be able to evaluate the particularities of dealing with states and non-state actors and the potential international solutions....
Reading
5 個視頻(共 29 分鐘), 3 個閱讀材料, 1 個測驗
Video5 個視頻
Law of Neutrality and Humanitarian Law3分鐘
Ambiguity and Attribution5分鐘
International Treaties5分鐘
Characteristics of Confidence Building Measures10分鐘
Reading3 個閱讀材料
Readings10分鐘
Readings10分鐘
Readings10分鐘
Quiz1 個練習
Quiz 4: Cyberwarfare and International Law20分鐘
4.4
Direction Signs

43%

完成這些課程後已開始新的職業生涯
Briefcase

83%

通過此課程獲得實實在在的工作福利
Money

11%

加薪或升職

熱門審閱

創建者 BKJul 20th 2017

I wish there should be a more detailed and broadened bulletins of particular and concrete cases about cyber conflicts throughout the whole world.

創建者 JJNov 12th 2016

Helpful course for clearing up common misconceptions related to attribution and existing legal charters related to cyber conflict.

講師

Sanjay Goel

Associate Professor & Chair
Information Technology Management, School of Business

Kevin Williams

Vice Provost and Professor
Psychology - University at Albany

關於 The State University of New York

The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe....

常見問題

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

還有其他問題嗎?請訪問 學生幫助中心