About this Course
By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare. Management of cyber incidents and conflicts requires an interdisciplinary perspective including an understanding of: 1) characteristics of the cyber threats and conflicts themselves, 2) international efforts to reduce and improve cyber security, and 3) psychological and sociopolitical factors. The course is designed to reach an international audience and will encourage discussion on relevant current events among participants to enrich the experience with various personal and cultural perspectives on cutting-edge issues. In addition, assignments and other assessments will supplement video lectures and selected readings to ensure application of the material. After taking this course you will be able to: • Identify different types of actors involved in cyber threats (individuals, organizations & nation-states) • Distinguish between different types of threats and issues in cyber security including, data theft, political espionage, critical infrastructure protection, and propaganda • Detail the basic characteristics of the Internet infrastructure and international efforts to address Internet governance • List several international efforts to address cyber crime and espionage • Evaluate how principals that govern international conflicts might be applied in context of cyber security • Apply different psychological theories of human motivation and cooperation and communication and political theories in analysis of different international issues related to cyber security including censorship, media operations and role of social technologies. Grading: Your grade is assessed based on discussion posts and quizzes. Individual taking this course for credit (i.e. students at the University at Albany y will be required to engage in additional activities communicated to them directly). Recommended Background: No background knowledge or skills are necessary, but an understanding and familiarity of cyber security, Internet infrastructure and international law would be advantageous for anyone who participates in the course. ACKNOWLEDGEMENTS Ersin Dincelli and Nic DePaula were the instructional designers for the course who assisted in the recording of the videos, reviewing material, creating slides, assessments and some of the content. Without their tremendous effort this would not have been possible. We also acknowledge the financial support for the recordings from the University at Albany as well as the support from Media and Marketing. Finally, thanks to Lisa Stephens who is the SUNY liaison to Coursera for being a strong supporter of the MOOC.
Globe

100% online courses

Start instantly and learn at your own schedule.
Clock

Approx. 8 hours to complete

Suggested: 5 hours/week
Comment Dots

English

Subtitles: English
Globe

100% online courses

Start instantly and learn at your own schedule.
Clock

Approx. 8 hours to complete

Suggested: 5 hours/week
Comment Dots

English

Subtitles: English

Syllabus - What you will learn from this course

1

Section
Clock
1 hour to complete

Introduction to Cybercrime

This module is intended to introduce you to a set of actors and motivations in the area of cyber security. After this module you will be able to identify the different threat actors and the different types of cybercrime. You will also be able to provide some preliminary analysis of cybercrime by understanding basic psychological mechanisms of motivation....
Reading
6 videos (Total 47 min), 1 reading, 1 quiz
Video6 videos
Evolution and Types of Cybercrime7m
Actors of Cybercrime6m
Understanding Motivated Behavior5m
Motives for Hacking12m
Cyber Attacks in a Global Context5m
Reading1 readings
Readings for Intro to Cybercrime10m
Quiz1 practice exercises
Quiz 1: Introduction to Cybercrime20m

2

Section
Clock
1 hour to complete

Internet Governance

This module covers technical aspects of the Internet and the domain name system, and efforts toward internet governance. After this module you should be able to define main components of the Internet infrastructure, identify the main issues in governance and compare different approaches to international internet policy....
Reading
5 videos (Total 36 min), 2 readings, 1 quiz
Video5 videos
Domain Name System6m
Internet Governance5m
Importance of Internet Governance8m
Current Issues in Internet Governance8m
Reading2 readings
Readings for Internet Infrastructure10m
Readings for Internet Governance10m
Quiz1 practice exercises
Quiz 2: Internet Governance20m

3

Section
Clock
2 hours to complete

Cyberwarfare and International Conflicts

In this module we cover the main types of attacks, actors and conflicts that may be considered aspects of cyberwarfare. After this module you will recognize the different types of cyber threats and the modes of attacks and discuss the motivations of state and non-state actors in this domain....
Reading
7 videos (Total 43 min), 3 readings, 1 quiz
Video7 videos
Modes of Attacks6m
Actors of Cyberwarfare8m
Types of the Attacks8m
Motivations of the Actors5m
Future Battles: Threats to Critical Infrastructure4m
Internet Censorship5m
Reading3 readings
Readings for Intro to Cyberwar10m
Readings for Modes and Types10m
Readings10m
Quiz1 practice exercises
Quiz 3: Cyberwarfare and International Conflicts20m

4

Section
Clock
1 hour to complete

Cyberwarfare and International Law

This modules covers political theories and legal arrangements pertinent to cyber security. After this module you will be able to describe principles of just war, basic aspects of International Humanitarian Law and treaties. You will be able to evaluate the particularities of dealing with states and non-state actors and the potential international solutions....
Reading
5 videos (Total 29 min), 3 readings, 1 quiz
Video5 videos
Law of Neutrality and Humanitarian Law3m
Ambiguity and Attribution5m
International Treaties5m
Characteristics of Confidence Building Measures10m
Reading3 readings
Readings10m
Readings10m
Readings10m
Quiz1 practice exercises
Quiz 4: Cyberwarfare and International Law20m

5

Section
Clock
2 hours to complete

Interpersonal Trust and Trust among Nations

This module deals more specifically with psychological explanations for individual trust and trust among nations. After this module you will be able to explain how people react in situations of giving and of trust. You will also be able to identify and discuss how confidence building measures may be applied in the domain of cyber security....
Reading
5 videos (Total 49 min), 2 readings, 1 quiz
Video5 videos
Ultimatum Game and Social Norms (Part 2)5m
Components of Trust and Social Capital12m
Trust between Nations and Prisonner's Dilemma10m
Psychological Perspective on Confidence Building Measures10m
Reading2 readings
Readings for Trust10m
Readings for CBM10m
Quiz1 practice exercises
Quiz 5: Interpersonal Trust and Trust among Nations20m
4.4
Direction Signs

43%

started a new career after completing these courses
Briefcase

83%

got a tangible career benefit from this course
Money

11%

got a pay increase or promotion

Top Reviews

By VUOct 10th 2016

I thought SPECTACULAR HOW PROVIDING CLASSES, making THOSE WHO LIVE IN OTHER COUNTRIES, SITUATIONS AND POWER NOTE PROVIDING SUCH INFORMATION ABOUT ONE OR OTHERWISE COMMUNICATE IN OUR COMMUNITIES.

By ARDec 12th 2016

Es una excelente opción para conocer lo relacionado a los conflictos que se presentan entre las naciones a través de Internet, ciberguerra y ciberdelincuencia

Instructors

Avatar

Sanjay Goel

Associate Professor & Chair

Kevin Williams

Vice Provost and Professor

About The State University of New York

The State University of New York, with 64 unique institutions, is the largest comprehensive system of higher education in the United States. Educating nearly 468,000 students in more than 7,500 degree and certificate programs both on campus and online, SUNY has nearly 3 million alumni around the globe....

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • If you pay for this course, you will have access to all of the features and content you need to earn a Course Certificate. If you complete the course successfully, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. Note that the Course Certificate does not represent official academic credit from the partner institution offering the course.

  • Yes! Coursera provides financial aid to learners who would like to complete a course but cannot afford the course fee. To apply for aid, select "Learn more and apply" in the Financial Aid section below the "Enroll" button. You'll be prompted to complete a simple application; no other paperwork is required.

More questions? Visit the Learner Help Center