Course Code: INTL649 Course ID: 4825 Credit Hours: 3 Level: Graduate
This course will examine various case studies in Foreign Cyber Threats and explore the challenges posed by these threats. Through the review of case studies, students will become familiar with the fact that cyber threats are difficult to assess and mitigate given the existence of malicious actors, multiple motives, different but commonly used attack vectors, the internet as a shared and integrated domain, difficulty in predicting potential attacks and the damaging nature of worst-case scenarios. (Prerequisite: SSGS500)
|Registration Dates||Course Dates||Session||Weeks|
|10/26/20 - 04/02/21||04/05/21 - 05/30/21||Spring 2021 Session B||8 Week session|
After successfully completing this course, you will be able to:
CO-1: Analyze the underlying challenges associated with cyberspace.
CO-2: Analyze the evolution of cyberspace policy and evaluate some of the implications for future cyberspace issues.
CO-3: Examine U.S. Government Cyber Policy and analyze their implications for dealing with cyberspace issues.
CO-4: Evaluate cyber-related case studies to assess implications for U.S. and future cyberspace issues.
CO-5: Examine future cyberspace policy issues and challenges.
Discussions – 20 percent
Weekly discussion questions are provided and posts should reflect assimilation of the readings. Students are required to provide a substantive initial post by Thursday at 11:55 pm ET and respond to two or more classmates by Sunday 11:55 pm ET. Discussion posts are graded on timeliness, relevance, knowledge of the weekly readings, and the quality of original ideas.
Cyber White Paper – 25 percent
This is an opportunity for the student to identify a key cyber-related issue and to develop a white paper that takes a specific stance at resolving the issue. Students will identify and summarize the key points of the issue upfront, develop the issue’s background and identify key problems, identify solutions, and wrap-up the issue by concluding with key facts. The white paper is 5-6 pages in length, 12 font, Times New Roman.
Case Study Research Proposal – 25 percent
The components of this assignment support the Case Study submitted at the end of class. Students will develop a research question, a purpose statement, and identify a theoretical framework and research design used to answer the research question. The proposal should be 7-8 pages in length.
Case Study Analysis – 30 percent
Based on the Cyber Research Proposal, students will conduct a case study analysis 15-16 pages. The page length does not include the cover page, the reference list, and any appendices.
Required Course Textbooks
There are no required textbooks. Specific readings and materials will be addressed in the individual weekly assignments.
The following book is recommended:
Turabian, Kate L. 2014. A Manual for Writers of Research Papers, Theses, and Dissertations. 8th ed. The University of Chicago Press.
Other Required Readings
- Peer-reviewed journal articles, book chapters, external websites and other assigned readings are found in the Lessons area of the classroom.
- Weekly Lesson Notes and videos or audio files are found in the Lessons area of the classroom.
|Book Title:||Various resources from the APUS Library & the Open Web are used. Please visit http://apus.libguides.com/er.php to locate the course eReserve.*|
|Book Title:||Professionalizing the Nation's Cybersecurity Workforce? : Criteria for Decision-Making (Ebook available through the APUS Online Library)|
|Publication Info:||National Academies Press|
|Author:||Computer Science and Telecommunications Board, etc.|
Not current for future courses.