INTL440
Cyber Warfare
Credit Hours: 3
Length of Course: 8 Weeks
Prerequisite: NONE
Table of Contents
Instructor Information
Evaluation Procedures
Course Description
Grading Scale
Course Scope
Course Outline
Course Objectives
Policies
Course Delivery Method
Online Library
Course Resources
Selected Bibliography
Instructor Information
Instructor: Lawrence D. Dietz, COL (R), USAR, JD, MBA, LLM, MSS
Biography: http://www.amu.apus.edu/academic/faculty-members/bio/1553/lawrence-d.-dietz
Please contact your instructor through the Messages tab in the classroom.
After the class is over, instructor contact information: Lawrence.Dietz@mycampus.amu.edu
Table of Contents
Course Description (Catalog)
INTL440 Cyber Warfare (3 hours)
This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.
Table of Contents
Course Scope
As a 400-level course, this course provides a higher level of knowledge building on the material taught at the 300 level. The purpose and scope of this course is to enable the student to build a deeper understanding of the discipline.
Table of Contents
Course Objectives
After successfully completing this course, you will be able to:
CO-1: Analyze cyberspace and cyber warfare.
CO-2: Diagram basic computer network operations.
CO-3: Compare selected cyber weapons and their associated attack strategies.
CO-4: Examine defensive strategies for securing networks.
CO-5: Evaluate cyber war capabilities of selected nations.
Table of Contents
Course Delivery Method
This course, delivered via distance learning, will
Bibliography: SANS Institute: www.sans.org/rr/papers/index.php?id=787 Libicki (2009) Robinson (2007): “Corporate Espionage 201” from SANS Institute Reading Room http://www.sans.org/reading_room/whitepapers/engineering/corporate-espionage-201_512 http://www.carlisle.army.mil/USAWC/parameters/Articles/2010summer/Thomas.pdf Thornbaugh, "The Invasion of the Chinese Cyberspies," Time, August 29, 2005, http://www.time.com/time/magazine/article/0,9171,1098961-1,00.html Gates, Gilbert. "How a Secret Cyberwar Program Worked." The New York Times, June 1, 2012. http://www.nytimes.com/interactive/2012/06/01/world/middleeast/how-a-secret-cyberwarprogram-worked.html?ref=middleeast Table of Contents