Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Build a clear, practical understanding of modern cybersecurity—from malware and identity theft to hacktivism and nation-state attacks. Learn how the internet’s architecture creates vulnerabilities, what laws and policies try to do about them, and how to protect yourself and your organization. You’ll explore real cases like Stuxnet, dissect threats (viruses, botnets, DDoS), weigh privacy vs. security in the age of Big Data, and prepare for the future with resilience-focused strategies.
Lessons
01: Stuxnet—The First Cyber Guided Missile — Stuxnet’s impact and how cyber tools can alter the physical world. (32 min)
02: The Incredible Scope of Cyberspace — How the internet works: search, TCP/IP, and layered connections. (30 min)
03: The Five Gateways of Internet Vulnerability — Why cyberspace is inherently exposed to attack. (30 min)
04: Of Viruses, Botnets, and Logic Bombs — Common attacks and the defenses that detect them. (32 min)
05: The Problem of Identity on the Network — Anonymity, attribution, and ethical trade-offs. (33 min)
06: Cyber Fraud, Theft, and Organized Crime — Online fraud/ID theft and law-enforcement responses. (31 min)
07: Hacktivists and Insurgency — Activists, insurgents, and mischief makers online. (31 min)
08: Nations at Cyber War — Defining cyber war and applying rules of conflict. (33 min)
09: Government Regulation of Cyberspace — Pros/cons of state oversight of security. (32 min)
10: International Governance and the Internet — Who runs the internet and why it’s hard to change. (35 min)
11: The Constitution and Cyberspace — Monitoring, limits, and constitutional boundaries. (33 min)
12: Big Data—“They” Know Everything about You — Tracking, location, and persistent data trails. (32 min)
13: Privacy for the Cyber Age — Rethinking privacy and using Big Data for accountability. (33 min)
14: Listening In and Going Dark — Encryption, wiretaps, and the challenge to investigators. (34 min)
15: The Devil in the Chips—Hardware Failures — Supply-chain risks and compromised components. (31 min)
16: Protecting Yourself in Cyberspace — Passwords, PC security, encryption, secure deletion. (31 min)
17: Critical Infrastructure and Resiliency — Designing systems to survive and recover from attack. (32 min)
18: Looking Forward—What Does the Future Hold? — Key takeaways and emerging trends. (36 min)

