HOME > IT & Software > Cyber- Hacking, Espionage, Terrorism Warfare

Cyber- Hacking, Espionage, Terrorism Warfare

SynopsisCyber: Hacking, Espionage, Terrorism & Warfare, available...
Cyber- Hacking, Espionage, Terrorism Warfare  No.1

Cyber: Hacking, Espionage, Terrorism & Warfare, available at $44.99, with 8 lectures, and has 36 subscribers.

You will learn about Learn how hacking and politics intersect Understand the benefits of cyber-espionage Explore how hacking is used in war Study how terrorists embrace hacking This course is ideal for individuals who are Technologists; Cyber students; hackers; international security enthusiasts It is particularly useful for Technologists; Cyber students; hackers; international security enthusiasts.

Enroll now: Cyber: Hacking, Espionage, Terrorism & Warfare

Summary

Title: Cyber: Hacking, Espionage, Terrorism & Warfare

Price: $44.99

Number of Lectures: 8

Number of Published Lectures: 8

Number of Curriculum Items: 8

Number of Published Curriculum Objects: 8

Original Price: £49.99

Quality Status: approved

Status: Live

What You Will Learn

  • Learn how hacking and politics intersect
  • Understand the benefits of cyber-espionage
  • Explore how hacking is used in war
  • Study how terrorists embrace hacking
  • Who Should Attend

  • Technologists; Cyber students; hackers; international security enthusiasts
  • Target Audiences

  • Technologists; Cyber students; hackers; international security enthusiasts
  • Hacking is having a profound impact on international security. As technological evolution accelerates with the coming of artificial intelligence, synthetic media (deepfakes), and quantum technologies, we will see dramatic societal and geopolitical disruptions. The manipulation of these technologies, particular via hacking, will introduce further complexity.

    This course explores the impact of the internet and hacking on international security. The programme comprises seven lectures that examine cyber’s impact on espionage, surveillance, terrorism, and warfare. The course also considers how cyber security is achieved in a constantly mutating technical and political environment. The lectures draw extensively on historic and contemporary case studies, including the ongoing wars in Europe and the Middle-East. This programme has been delivered to over 2000 people in private settings, and for the first time is now available online!

    For those experienced in cyber, you may want to skip lectures two and four as they aimed at non-cyber specialists.

    Lecture I: Security in the Digital Age

    Provides an overview of how the Internet and hacking have disrupted international security.

    Lecture II: Cyber Security

    Investigates how cyber security is achieved within an ever-mutating political and technical environment.

    Lecture III: Hackers

    Charts the genesis of hacker, from their mid-twentieth century origins to present incarnations.

    Lecture IV: Anatomy of Hacking

    Dissects how attackers breach networks and achieve their objectives (e.g. disruption, data theft).

    Lecture V:  Cyber Espionage

    Examines the revolutionary impact cyber has had on espionage, compares traditional and cyber variants, and investigates how the two interact.

    Lecture VI: Cyber Warfare

    Focuses on cyber-warfare, drawing extensively on the ongoing Russia-Ukraine conflict, before imagining the future of warfare in the cyber era.

    Lecture VI: Cyber Terrorism

    Examines the impact of digital technology on propaganda, financing, recruitment, and operations, before analysing how terrorists are embracing hacking.

    Ultimately, the course depicts how international security is evolving in the cyber era.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Lecture 2: Security in the Digital Age

    Lecture 3: Cyber Security

    Lecture 4: Anatomy of Hacking

    Lecture 5: Hackers

    Lecture 6: Cyber Espionage

    Lecture 7: Cyber Warfare

    Lecture 8: Cyber Terrorism

    Instructors

  • Cyber- Hacking, Espionage, Terrorism Warfare  No.2
    Craig Jarvis
    Technology and International Security Researcher
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 0 votes
  • 3 stars: 0 votes
  • 4 stars: 0 votes
  • 5 stars: 0 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!