Chevron Left
Volver a International Cyber Conflicts

Opiniones y comentarios de aprendices correspondientes a International Cyber Conflicts por parte de Universidad Estatal de Nueva York

1,268 calificaciones
296 reseña

Acerca del Curso

By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare. Management of cyber incidents and conflicts requires an interdisciplinary perspective including an understanding of: 1) characteristics of the cyber threats and conflicts themselves, 2) international efforts to reduce and improve cyber security, and 3) psychological and sociopolitical factors. The course is designed to reach an international audience and will encourage discussion on relevant current events among participants to enrich the experience with various personal and cultural perspectives on cutting-edge issues. In addition, assignments and other assessments will supplement video lectures and selected readings to ensure application of the material. After taking this course you will be able to: • Identify different types of actors involved in cyber threats (individuals, organizations & nation-states) • Distinguish between different types of threats and issues in cyber security including, data theft, political espionage, critical infrastructure protection, and propaganda • Detail the basic characteristics of the Internet infrastructure and international efforts to address Internet governance • List several international efforts to address cyber crime and espionage • Evaluate how principals that govern international conflicts might be applied in context of cyber security • Apply different psychological theories of human motivation and cooperation and communication and political theories in analysis of different international issues related to cyber security including censorship, media operations and role of social technologies. Grading: Your grade is assessed based on discussion posts and quizzes. Individual taking this course for credit (i.e. students at the University at Albany y will be required to engage in additional activities communicated to them directly). Recommended Background: No background knowledge or skills are necessary, but an understanding and familiarity of cyber security, Internet infrastructure and international law would be advantageous for anyone who participates in the course. ACKNOWLEDGEMENTS Ersin Dincelli and Nic DePaula were the instructional designers for the course who assisted in the recording of the videos, reviewing material, creating slides, assessments and some of the content. Without their tremendous effort this would not have been possible. We also acknowledge the financial support for the recordings from the University at Albany as well as the support from Media and Marketing. Finally, thanks to Lisa Stephens who is the SUNY liaison to Coursera for being a strong supporter of the MOOC....

Principales reseñas

15 de ago. de 2020

Great course! Learned a lot about Cyber Warfare and how countries can build up trust and cooperation between themselves to tackle third party threats in the cyberspace.

5 de ago. de 2020

I have learnt the causes of cyber conflicts and raising tensions among nations, the causes and how nations can come to mutual understanding or agreements. Thanks.

Filtrar por:

176 - 200 de 292 revisiones para International Cyber Conflicts

por Julio C S O

22 de abr. de 2017

Great Couse!

por Suharto D

11 de may. de 2020

just nice .

por Aakash M

23 de abr. de 2020

very useful

por Jack S

23 de mar. de 2020


por David G

5 de may. de 2020


por ADEL A

29 de ago. de 2017

very great

por Matthew F

27 de ene. de 2017


por Md. T U B

7 de nov. de 2020


por Flt L G R

20 de jul. de 2020


por Babloo S

29 de may. de 2020


por Ankit G

12 de may. de 2020

good pne

por Margarito Z

18 de jul. de 2019


por Alisha C

12 de abr. de 2020


por Matias P

18 de jun. de 2019

So good!

por prasad s s

27 de dic. de 2020


por Соломатин А Н

16 de mar. de 2019



16 de oct. de 2016


por sanjana c

4 de feb. de 2021


por Triveda K

31 de oct. de 2020


por L. D

28 de may. de 2020


por David I

15 de nov. de 2019



27 de mar. de 2018



22 de jul. de 2020


por Daniel L

9 de jun. de 2020

This is a great course to get a solid understanding of the human, the psychological aspect of international cyber activities. This covers civilians, criminals, and of course associated government activities. There is a strong component on the motivation of cyber attackers. This is crucial for any cyber analyst, since there is the potential to dissuade or even eliminate the motivation for the cyber hacker to carry out attacks.

Another really interesting aspect of the cyber space arena is the comparison of it to the traditional war space. Is it the same? This gets to the heart of the nature of cyber space, it's intangibility, and its no-boundaries, classless nature. The final analogy drawn is between the cyber tools/war race and the nuclear arms race. Readings support the fact that we are in the early stages of cyber space, but are they really the same?

I enjoyed this course, and it's different approach to more technical cyber courses. My only comment would be that the quiz content would be more broad, and not relate directly back to smaller quizzes in each lecture. In other words, to allow for more thinking on the topic relating to the readings, and understanding of the materials, since this is not a cut and dry cyber course, it is quite subjective. Even short answer would be welcome. Other than that I gained a lot of context to cyber security overall from this course.

por Donald D

6 de mar. de 2016

This was a very good course (4.5/5.0). One area that could be improved would be the discussion of industrial control systems (ICS). On lecture briefly mentions STUXNET and SCADA, but this was rather incomplete discussion. A very recent incident that could have been used was the attack on the Ukraine Power grid as a demo of a cyber attack against infrastructure.

I am perhaps biased toward this area, since this is my field of work.