Cyber Space & Cyber Conflict Policy

Courses: Networks (General)
  • Course:Cyber Space & Cyber Conflict Policy
  • Course ID:CYBERPOL Duration:2 days Where: Your Office (7+ Persons)
  • Available as a private, customized course for your group at your offices or ours and in some cases as a WebLive(TM) class.

  • Download Course Description (PDF)

Course Outline

  • Introduction to Cyberspace
    • History of Cyberspace
      • Brief History of the Internet
      • Brief History of Internet Policy
      • Societal Reliance on the Internet and Cyber Power
      • Cyberspace as a Warfare Dimension
    • Defining Cyberspace, Control, and Borders
    • Cyber Actors:  Governments, Quasi-governments, Private Entities, Intermediaries
    • Cybercrime and Cybersecurity
      • Discussion of the Threats
      • Defining the Risks
  • Internet Governance
    • History: ARPANET/NSFNET and the Internet
    • ICANN
    • IETF and Standards
  • United States Legal Aspects
    • Civil Law
      • Civil Liberties and Privacy
    • Criminal Law
      • Law Enforcement
    • Governmental Authorities:  Law Enforcement, Intelligence, and Military
    • Case Study:  Coreflood Botnet
  • NATO Aspects
    • NATO Cyber Policies
    • Offensive vs. Defensive
    • Case Study:  Estonia’s Role in NATO Cyber Policy
  • United Nations Aspects
    • Proposed Cyber Security Treaty
    • China and Russia’s Role
    • Cyber as a Human Right
  • Case Study: Wikileaks and Anonymous
  • Industry Collaboration and Public/Private Partnerships
    • Opportunities for International Collaboration, such as APEC
    • FIRST, CERT
    • Industry Groups
  • Wrap-up
    • Course Recap and Q/A
    • Evaluations
Course Overview

Course in a Nutshell

A spate of cyber-attacks, some of which were quite persistent and severe, have recently affected government agencies as well as businesses in a wide range of industries, including the CIA, US Senate, IMF, Google, Lockheed Martin, Sony, Citigroup, and others. This has led the Pentagon to enunciate a formal cyber strategy and Leon Panetta, the US Defense Secretary, to warn that “the next Pearl Harbor we confront could very well be a cyber-attack.”
This two day course provides an overview of cyber space and cyber governance, covering both national and international policies and regulations that shape how the Internet is used and involved in cyber conflict. The course is taught by someone currently involved in pushing the state-of-the-art of cyber security/warfare technology and regulation/policy and is continually updated to include the latest research.

 

Customize It!

We can customize the content and duration of this course to the needs of diverse participant groups in business or government. We can also adjust the course’s “tech level” to the type of your audience, such as technical professionals, managers/executives, or policy makers/strategists.

 

Learn How To

  • Define the actors and boundaries in cyber space, and their motives and capabilities.
  • Describe the legal and governance organizations associated with the Internet.
  • Describe the role played by NATO, UN, and other international players.
Audience / Prerequisites

Aimed At

Information/communications industry professionals, business or government security professionals, and others interested in learning how policy and regulation over the past twenty years has shaped the Internet and current legal/political issues surrounding cyber security.

 

Prerequisites

General familiarity with telecommunications.