Preview

INTL 440 Syllabus LDD Jan 14

Best Essays
Open Document
Open Document
2263 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
INTL 440 Syllabus LDD Jan 14
School of Security and Global Studies
INTL440
Cyber Warfare
Credit Hours: 3
Length of Course: 8 Weeks
Prerequisite: NONE

Table of Contents

Instructor Information
Evaluation Procedures
Course Description
Grading Scale
Course Scope
Course Outline
Course Objectives
Policies
Course Delivery Method
Online Library
Course Resources
Selected Bibliography

Instructor Information

Instructor: Lawrence D. Dietz, COL (R), USAR, JD, MBA, LLM, MSS
Biography: http://www.amu.apus.edu/academic/faculty-members/bio/1553/lawrence-d.-dietz
Please contact your instructor through the Messages tab in the classroom.
After the class is over, instructor contact information: Lawrence.Dietz@mycampus.amu.edu

Table of Contents

Course Description (Catalog)
INTL440 Cyber Warfare (3 hours)
This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.

Table of Contents
Course Scope

As a 400-level course, this course provides a higher level of knowledge building on the material taught at the 300 level. The purpose and scope of this course is to enable the student to build a deeper understanding of the discipline.

Table of Contents
Course Objectives

After successfully completing this course, you will be able to:

CO-1: Analyze cyberspace and cyber warfare.
CO-2: Diagram basic computer network operations.
CO-3: Compare selected cyber weapons and their associated attack strategies.
CO-4: Examine defensive strategies for securing networks.
CO-5: Evaluate cyber war capabilities of selected nations.

Table of Contents
Course Delivery Method

This course, delivered via distance learning, will



Bibliography: SANS Institute: www.sans.org/rr/papers/index.php?id=787 Libicki (2009) Robinson (2007): “Corporate Espionage 201” from SANS Institute Reading Room http://www.sans.org/reading_room/whitepapers/engineering/corporate-espionage-201_512 http://www.carlisle.army.mil/USAWC/parameters/Articles/2010summer/Thomas.pdf Thornbaugh, "The Invasion of the Chinese Cyberspies," Time, August 29, 2005, http://www.time.com/time/magazine/article/0,9171,1098961-1,00.html Gates, Gilbert. "How a Secret Cyberwar Program Worked." The New York Times, June 1, 2012. http://www.nytimes.com/interactive/2012/06/01/world/middleeast/how-a-secret-cyberwarprogram-worked.html?ref=middleeast Table of Contents

You May Also Find These Documents Helpful

  • Powerful Essays

    ITM 309 Summer 2014 Syllabus

    • 1794 Words
    • 13 Pages

    1) Business Driven Information Systems and Technology, 4rd Edition, 2014 Copyright; MSU Custom Green Textbook - (Required)…

    • 1794 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    APOL104 8wk Syllabus 1

    • 1135 Words
    • 5 Pages

    Caner, Ergun, and Ed Hindson (eds.) The Popular Encyclopedia of Apologetics: Surveying the Evidence for the Truth of Christianity. Eugene, OR: Harvest House Publishers, 2008. ISBN: 9780736920841.…

    • 1135 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Articles listed on the Critical Article Review list at the end of the syllabus, which are available…

    • 2623 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    the “evolution” and continuing relevance of racial identities and ethnic notions, as well as the…

    • 1109 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    (such as Lean and Six Sigma), and modern quality topics applied in the global environment.…

    • 866 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The University of Lethbridge

    • 2667 Words
    • 11 Pages

    This course is designed not only to deepen your knowledge of concepts already covered in other courses, but also to broaden the application of these concepts. I sincerely hope that you have…

    • 2667 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    Mba 550 Course Syllabus

    • 4265 Words
    • 18 Pages

    Whenever there is a question about what assignments are due, please remember this syllabus is considered to be the ruling document.…

    • 4265 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Syllabus

    • 3145 Words
    • 13 Pages

    The primary objective of this course is to explore the subject matter of the field and to become familiar with the vocabulary and concepts of the field.…

    • 3145 Words
    • 13 Pages
    Good Essays
  • Best Essays

    Over the past couple of decades America has been fighting against the growing threat of terrorism. As the new millennium unravels, the age of the computer dawns the terrorists are beginning to fight on a different mainframe: the computer. The latest threat to U.S. intelligence is not terrorist attacks anymore, but cyber terrorism. As your Special Advisor on cyber security and cyber terrorism, I can prevent terrorist from all over the world from causing damage to our country.…

    • 613 Words
    • 3 Pages
    Best Essays
  • Good Essays

    Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to…

    • 824 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    References: Army, U. (2005). Cyber Operations and Cyber Terrorism. In U. Army, U.S. Army Training…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    cybercrime

    • 2069 Words
    • 8 Pages

    The development on information technology and cyberspace made the world as a small global village. People can get access right through the world from their home with internet. The trends of global terrorism are also changed by using such IT. Cyber crime as a “new weapon” becomes a potential threat in international peace.…

    • 2069 Words
    • 8 Pages
    Powerful Essays

Related Topics