International Cyber Conflicts Course Syllabus
Full curriculum breakdown — modules, lessons, estimated time, and outcomes.
Overview: This course provides a comprehensive introduction to international cyber conflicts, blending technical, legal, and psychological perspectives. Designed for beginners, it explores cyber threats, Internet governance, cyberwarfare, and international law. Through video lectures, readings, and practical assessments, learners will gain foundational knowledge applicable to cybersecurity policy and global digital challenges. The course takes approximately 5 hours to complete and offers flexible pacing ideal for working professionals.
Module 1: Introduction to Cybercrime
Estimated time: 1 hour
- Introduction to cybercrime and fundamental issues
- Evolution and types of cybercrime
- Actors of cybercrime
- Understanding motivated behavior
- Motives for hacking
- Cyber attacks in a global context
Module 2: Internet Governance
Estimated time: 1 hour
- Internet infrastructure
- Domain Name System
- Internet governance
- Importance of Internet governance
- Current issues in Internet governance
Module 3: Cyberwarfare and International Conflicts
Estimated time: 1 hour
- Introduction to cyberwarfare
- Modes of attacks
- Actors of cyberwarfare
- Types of attacks
- Motivations of the actors
- Future battles: threats to critical infrastructure
- Internet censorship
Module 4: Cyberwarfare and International Law
Estimated time: 1 hour
- Principles of just war
- Law of neutrality and humanitarian law
- Ambiguity and attribution
- International treaties
- Characteristics of confidence-building measures
Module 5: Interpersonal Trust and Trust among Nations
Estimated time: 1 hour
- Ultimatum game and social norms
- Components of trust and social capital
- Trust between nations and the prisoner’s dilemma
- Psychological perspectives on confidence-building measures
Prerequisites
- Basic understanding of cybersecurity concepts is recommended
- Familiarity with international relations helpful but not required
- Access to online resources for supplementary reading
What You'll Be Able to Do After
- Identify key cyber threat actors including individuals, organizations, and nation-states
- Distinguish between types of cyber threats such as data theft, espionage, and propaganda
- Understand the structure and governance of Internet infrastructure
- Evaluate how international conflict principles apply to cybersecurity
- Analyze cybersecurity issues using psychological and political theories