About this Course
4.4
507 ratings
123 reviews
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Hours to complete

Approx. 9 hours to complete

Suggested: 6 hours/week...
Available languages

English

Subtitles: English

Skills you will gain

CybersecurityCybercrimeCyberwarfareInternet Protocol (IP) Suite
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Hours to complete

Approx. 9 hours to complete

Suggested: 6 hours/week...
Available languages

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
Hours to complete
1 hour to complete

Introduction to Cybercrime

This module is intended to introduce you to a set of actors and motivations in the area of cyber security. After this module you will be able to identify the different threat actors and the different types of cybercrime. You will also be able to provide some preliminary analysis of cybercrime by understanding basic psychological mechanisms of motivation....
Reading
6 videos (Total 47 min), 1 reading, 1 quiz
Video6 videos
Evolution and Types of Cybercrime7m
Actors of Cybercrime6m
Understanding Motivated Behavior5m
Motives for Hacking12m
Cyber Attacks in a Global Context5m
Reading1 reading
Readings for Intro to Cybercrime10m
Quiz1 practice exercise
Quiz 1: Introduction to Cybercrime20m
Week
2
Hours to complete
1 hour to complete

Internet Governance

This module covers technical aspects of the Internet and the domain name system, and efforts toward internet governance. After this module you should be able to define main components of the Internet infrastructure, identify the main issues in governance and compare different approaches to international internet policy....
Reading
5 videos (Total 36 min), 2 readings, 1 quiz
Video5 videos
Domain Name System6m
Internet Governance5m
Importance of Internet Governance8m
Current Issues in Internet Governance8m
Reading2 readings
Readings for Internet Infrastructure10m
Readings for Internet Governance10m
Quiz1 practice exercise
Quiz 2: Internet Governance20m
Week
3
Hours to complete
2 hours to complete

Cyberwarfare and International Conflicts

In this module we cover the main types of attacks, actors and conflicts that may be considered aspects of cyberwarfare. After this module you will recognize the different types of cyber threats and the modes of attacks and discuss the motivations of state and non-state actors in this domain....
Reading
7 videos (Total 43 min), 3 readings, 1 quiz
Video7 videos
Modes of Attacks6m
Actors of Cyberwarfare8m
Types of the Attacks8m
Motivations of the Actors5m
Future Battles: Threats to Critical Infrastructure4m
Internet Censorship5m
Reading3 readings
Readings for Intro to Cyberwar10m
Readings for Modes and Types10m
Readings10m
Quiz1 practice exercise
Quiz 3: Cyberwarfare and International Conflicts20m
Week
4
Hours to complete
1 hour to complete

Cyberwarfare and International Law

This modules covers political theories and legal arrangements pertinent to cyber security. After this module you will be able to describe principles of just war, basic aspects of International Humanitarian Law and treaties. You will be able to evaluate the particularities of dealing with states and non-state actors and the potential international solutions....
Reading
5 videos (Total 29 min), 3 readings, 1 quiz
Video5 videos
Law of Neutrality and Humanitarian Law3m
Ambiguity and Attribution5m
International Treaties5m
Characteristics of Confidence Building Measures10m
Reading3 readings
Readings10m
Readings10m
Readings10m
Quiz1 practice exercise
Quiz 4: Cyberwarfare and International Law20m
4.4
123 ReviewsChevron Right
Career direction

43%

started a new career after completing these courses
Career Benefit

83%

got a tangible career benefit from this course
Career promotion

11%

got a pay increase or promotion

Top Reviews

By BKJul 20th 2017

I wish there should be a more detailed and broadened bulletins of particular and concrete cases about cyber conflicts throughout the whole world.

By JJNov 12th 2016

Helpful course for clearing up common misconceptions related to attribution and existing legal charters related to cyber conflict.

Instructors

Avatar

Sanjay Goel

Associate Professor & Chair
Information Technology Management, School of Business

Kevin Williams

Vice Provost and Professor
Psychology - University at Albany

About The State University of New York

The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe....

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.