INTL 440 Syllabus LDD Jan 14

Topics: Cyberwarfare, Electronic warfare, Cyber Operations Pages: 12 (2263 words) Published: January 14, 2015


School of Security and Global Studies
INTL440
Cyber Warfare
Credit Hours: 3
Length of Course: 8 Weeks
Prerequisite: NONE

Table of Contents

Instructor Information
Evaluation Procedures
Course Description
Grading Scale
Course Scope
Course Outline
Course Objectives
Policies
Course Delivery Method
Online Library
Course Resources
Selected Bibliography

Instructor Information

Instructor:Lawrence D. Dietz, COL (R), USAR, JD, MBA, LLM, MSS Biography:http://www.amu.apus.edu/academic/faculty-members/bio/1553/lawrence-d.-dietz Please contact your instructor through the Messages tab in the classroom. After the class is over, instructor contact information: Lawrence.Dietz@mycampus.amu.edu

Table of Contents

Course Description (Catalog)
INTL440 Cyber Warfare (3 hours)
This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.

Table of Contents
Course Scope

As a 400-level course, this course provides a higher level of knowledge building on the material taught at the 300 level. The purpose and scope of this course is to enable the student to build a deeper understanding of the discipline.

Table of Contents
Course Objectives

After successfully completing this course, you will be able to:

CO-1: Analyze cyberspace and cyber warfare.
CO-2: Diagram basic computer network operations.
CO-3: Compare selected cyber weapons and their associated attack strategies. CO-4: Examine defensive strategies for securing networks.
CO-5: Evaluate cyber war capabilities of selected nations.

Table of Contents
Course Delivery Method

This course, delivered via distance learning, will enable students to complete academic work in a flexible manner, completely online.  Course resources and access to an online learning management system will be available to each student. Online assignments are due by Sunday at 11:55 pm ET and include all written assignments, examinations, and research papers submitted for grading. Weekly Forum questions (accomplished in groups in a Forum) require a primary posting by Thursday at 11:55 pm ET, with all other required responses due by Sunday at 11:55 pm ET.  The assigned faculty will support the students throughout this eight-week course.

Table of Contents

Course Resources

Required Course Textbook:

Andress, Jason, and Steve Winterfeld. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress Publishing, 2011. APUS Online Library

External websites and other assigned reading found in the Lessons area of the classroom.

Weekly Lesson Notes and videos or audio files are found in the Lessons area of the classroom. Table of Contents
Evaluation Procedures

Forum discussions – 25 percent

Each week, a discussion question is provided and posts should reflect an assimilation of the readings. Students are required to provide a substantive initial post by Thursday at 11:55 pm ET and respond to 2 or more classmates by Sunday 11:55 pm ET. Forum posts are graded on timeliness, relevance, knowledge of the weekly readings, and the quality of original ideas.

My experience has shown that it takes about 600 words to make an effective primary posting. You also need to employ references in the form of footnotes to support your key points. Wikipedia is not an acceptable academic reference.

Effective responses need to add value to the overall conversation. Generally this cannot be accomplished in less than 100 words or so.

Be advised if your responses all come on Sunday that you will not likely score very well in that...

Bibliography: SANS Institute: www.sans.org/rr/papers/index.php?id=787
Libicki (2009)
Robinson (2007): “Corporate Espionage 201” from SANS Institute Reading Room
http://www.sans.org/reading_room/whitepapers/engineering/corporate-espionage-201_512
http://www.carlisle.army.mil/USAWC/parameters/Articles/2010summer/Thomas.pdf
Thornbaugh, "The Invasion of the Chinese Cyberspies," Time, August 29, 2005, http://www.time.com/time/magazine/article/0,9171,1098961-1,00.html
Gates, Gilbert. "How a Secret Cyberwar Program Worked." The New York Times, June 1, 2012. http://www.nytimes.com/interactive/2012/06/01/world/middleeast/how-a-secret-cyberwarprogram-worked.html?ref=middleeast
Table of Contents
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay on CHAPTER 1 Jan 14
  • syllabus Essay
  • Essay about 6000 syllabus fall 14
  • Syllabus Research Paper
  • Essay on Syllabus
  • Syllabus Essay
  • syllabus Essay
  • Syllabus Essay

Become a StudyMode Member

Sign Up - It's Free