Cybersecurity online course

Cybersecurity online course

Start date: 14 October 2024

Today’s headlines often feature the word ‘cyber’, reporting on threats related to the virtual world: online frauds, stolen credit cards, ‘the dark web’, ransomware, computer hacks and viruses, botnets and denial-of-service attacks on corporate and government servers, and cyberespionage.

What are the real cybersecurity threats – and risks? What has changed during COVID-19? What are the major policy and regulatory challenges? What is the role of diplomacy, international legal instruments, and regional and national policies in addressing these threats, and how efficient are they? How does international co-operation in cybersecurity work, and what are the roles of the various stakeholders?

YouTube player

This 10-week online advanced course in Cybersecurity covers technological and geopolitical risks, policy challenges, actors, and initiatives related to cybersecurity, especially those related to cybercrime, violence, and cyberwarfare. It also covers a broader context: the relations of cybersecurity with economic development and human rights.

This course can be taken as part of the Advanced Diploma in Internet Governance.

Reviews

Cybersecurity

Text – Anastasiya Kazakova

Anastasiya Kazakova alumni reviewsWe face a multitude of issues in cyberspace, but Diplo has managed to cover all of them in a highly interactive, informative, and extremely helpful learning course on cyber diplomacy, cybersecurity, and related governance issues. If you work in this sphere, take the course – it will really help. You will learn all the necessary basics that are fundamental for all cybersecurity professionals.

– Ms Anastasiya Kazakova, Public Affairs Manager, Kaspersky, Russia

Text – Kasek Galgal

Kasek Galgal alumni reviewsA relevant and applicable look at cybersecurity that takes into account the different aspects of the subject matter. The intuitive e-learning environment allows for informative discussions and interactions between participants and instructors alike. Also, the global composition of both the participants and instructors allows one to gain useful insight into diverse experiences and views on cybersecurity.

– Mr Kasek Galgal, Tutor/Lecturer, Physics Division, University of Papua New Guinea

Text – Mohit Saraswat

hpfAK1XW Mohit Saraswat alumni reviewsHaving a technical security (network and information security) background, I was a little sceptical about the value this course could to offer. The course content and discussions came as a pleasant surprise, as they offered insights into cybersecurity not only from a technical perspective, but included the social, legal, and economic aspects of security. These facets are usually missing in other widely available cybersecurity courses, but are becoming increasingly important in solving the complex challenges that cybersecurity has set for humankind.

– Mr Mohit Saraswat, Founder, Internet Society Chapter, United Arab Emirates

Text – Rafael Alberto Patrignani

jFcV238A Rafael Alberto Patrignani alumni reviewsThe course was a very good opportunity to meet colleagues from different countries and learn about their different approaches and objectives in regard to cybersecurity. The integration of knowledge was successfully accomplished by the systematic learning methodology. The course helped me integrate my previous knowledge and gain a deeper understanding of this subject.

– Mr Rafael Alberto Patrignani, Counsellor, Ministry of Foreign Affairs, Argentina

Text – Robert Nkambwe

U2gJqobk Robert Nkambwe alumni reviewsPrior to taking the course, I was oblivious to the global impact and the geostrategic challenges posed by cybersecurity dynamics. Thanks to this mind-blowing course, I feel more elevated and empowered in understanding the subject and its technical, legal, social, and geopolitical elements. I was also intrigued by the rich international experiences of the course lecturers and the uniqueness of the learning method where every participant is allowed to freely express his/her own opinion.

– Mr Robert Nkambwe, Director of Information and Communication Technology, Bugema University, Kampala, Uganda

Text – Juan D. Abarca Salas

itOmTDWm Juan D. Abarca Salas alumni reviewsThe course’s approach to cybersecurity issues, such as cybercrime, online violence and child protection, critical infrastructure, cyber warfare, and the study of cybersecurity policy frameworks, was presented by the lecturers in a wise, precise, and knowledgeable manner. In addition, guest experts and course participants provided productive and exciting interactions.

– Mr Juan D. Abarca Salas, IT Regional Officer, Consulate General of Mexico in Toronto, Canada

Text – Xiang Teo Zheng

Xiang Teo Zheng alumni reviewsThe course describes several ambiguities in the international interpretation of cyberspace regulation and cooperation, and highlights the need for greater understanding and collaboration (international and public–private partnership) for establishing the rule of law in cyberspace, norms of addressing common types of infringement (e.g. cybercrime), and progressive de-escalation of conflicts. The course has been a useful primer in understanding tensions at the international, national, organisation (business), and personal levels in the face of irresponsible (deliberate or unintentional) behaviour in cyberspace.

– Mr Xiang Teo Zheng, Head of Advisory (Consulting), Ensign InfoSecurity Private Limited, Saudi Arabia

Text – Christopher James Sampson

hzgHTvF9 Christopher James Sampson alumni reviewsThis course has been invaluable for my work in digital inclusion, and I feel much better informed around the aspects of cybersecurity which I will use to assist the communities that I am working with, particularly in the Pacific region.

– Mr Christopher James Sampson, Director, Future Earth Systems; Founder, Digital Society Foundation; Fellow, University of Technology Sydney; Deputy Chair, Regional Development Australia; Board Member, Eldercare Inc., Australia

Text – Ioniarimalala Rakotonirina

Diplo alumnus Ioniarimalala RakotonirinaHaving a technical and technological background, I found this course very informative, as it was an opportunity to understand cybersecurity at a higher level, including its state and diplomatic aspects. In addition to the content and the teaching methodology, exchanges between participants were really enriching.

– Mr Ioniarimalala Rakotonirina, IT Manager, Management Sciences for Health, USAID ACCESS Health Program, Madagascar

What will you learn?

  • How to identify the defining features of cybersecurity and the factors which shape international issues
  • How to identify principal technological and social threats to cybersecurity; describe and analyse key cybersecurity issues for users, companies, institutions, and states
  • How to identify challenges related to online terrorism and violent extremism, as well as the emerging global intiatives to combat them
  • How to explain the emerging cybercrime environment and its impacts, and the challenges of investigation, and national and international co-operation
  • How to explain risks from cyber conflict, the challenges of applying international law to cyberspace, and ongoing diplomatic and political deliberations
  • To understand and assess the challenges involved in the social aspects of cybersecurity, in particular the interplay between commercial and developmental aspects, and online freedoms and privacy
  • How to explain and analyse national and international policy frameworks and instruments

How will you learn?

In this course you will interact intensively in discussions with classmates and lecturers from around the world. You will receive guidance and personalised feedback on your classwork from the course team.

How long will you learn?

The course lasts for 10 weeks:

  • 1 week of course introduction and orientation to online learning
  • 8 weeks of addressing the course topics one by one (see below for more details)
  • 1 week for the final assignment and completing pending tasks

Course lecturers

 Face, Head, Person, Mustache, Adult, Male, Man, Photography, Portrait, Accessories, Glasses

Vladimir Radunović

Director of Cybersecurity & E-diplomacy, Diplo

Tatiana Tropina

Assistant Professor in cybersecurity governance, Institute of Security and Global Affairs, Leiden University

Katherine Getao - Diplo lecturer

Katherine Getao

Cyber Hygiene, Cyber Diplomacy, and ICT Strategy and Governance Consultant

Anastasiya Kazakova

Anastasiya Kazakova

Cyber Diplomacy Knowledge Fellow, Diplo

Virginia (Ginger) Paque

Senior Policy Editor, Diplo

 Face, Head, Person, Photography, Portrait, Indoors, Adult, Male, Man, Accessories, Glasses, Clothing, Coat

Asoke Mukerji

Former Indian Ambassador to the United Nations, New York

Who should apply

Diplo seeks applications from the following, from both developed and developing countries:

  • Officials in government ministries, departments, judicial or regulatory institutions dealing with security and/or ICT-related policy issues (e.g. security and defence, foreign affairs, justice, telecommunications);
  • Experts and officials in intergovernmental, international and regional organisations in charge of security cooperation, justice and home affairs, defence or internet and ICT policy;
  • Academics, researchers and postgraduate students in the field of security and/or internet;
  • Professionals from the corporate sector in charge of internet and security policies;
  • Journalists and staff of non-governmental organisations, covering issues of internet rights and security.

This course may also be of interest to:

  • Practising diplomats, civil servants, and others working in international relations who want to refresh or expand their knowledge on the subject, under the guidance of experienced practitioners and academics.
  • Postgraduate students of diplomacy or international relations wishing to study topics not offered through their university programmes or diplomatic academies and to gain deeper insight through interaction with practising diplomats.

Overview

The course consists of 8 modules:

  • Introduction to cybersecurity discusses the historical development of cybersecurity, and global and geostrategic challenges. The module distinguishes between the commonly narrow understanding of cybersecurity as only relating to cyber-threats and the broader notion which includes information security and security aspects of the global race for technological dominance. It also looks at the mapping of targets and the motives behind cyber-attacks such as hactivism, crime, espionage, terrorism, and warfare. Optionally, the module allows participants to better understand the technology behind the internet, and the basics of multilateral diplomacy.
  • Cybersecurity risks focuses on the vulnerabilities of cyberspace as well as emerging threat actors, procedures, and tools. The module particularly reviews key vulnerabilities and common cybersecurity threats to individuals and institutions such as malware, botnets, distributed denial-of-service (DDoS), phishing, e-scams, and identity theft.
  • Cybercrime (parts I and II) define and classify cybercrime and analyse its economic and social impact, taking into account emerging technological and societal trends. The modules focus on combating cybercrime, including existing legal frameworks and negotiations at the global and regional levels (such as the Council of Europe ‘Budapest Convention’, and the UN open-ended intergovernmental expert committee), international co-operation frameworks and various law enforcement approaches, computer investigation, and digital forensics.
  • Cyber conflicts and international security (parts I and II) look at cyber conflicts, including the main risks for conducting warfare by cyber means. The modules review challenges of the applicability of international law to cyberspace, as well as ongoing diplomatic efforts to define norms and confidence-building measures related to state behaviour in cyberspace (in particular the UN group of governmental experts and the open-ended working group, but also the efforts of regional organisations like OSCE, OAS and ARF, and multistakeholder processes like the Paris Call for Trust and Security in Cyberspace).
  • Cybersecurity policy frameworks analyses national cybersecurity mechanisms, starting with examples of national cybersecurity strategies, followed by a close look at the importance, role, and structure of national computer emergency response teams (CERTs) and computer security incident response teams (CSIRTs). The module also looks at the importance of public-private partnerships, developing national competences and awareness, and international co-operation through multilateral and multistakeholder forums.
  • Broader context of cybersecurity correlates cybersecurity and other social and political issues related to digital policies and internet governance. The module looks at the connection between privacy and security, with particular reflection on social media challenges, issues of openness and online freedoms, and objectionable and harmful content. It then briefly covers ethics and gender issues, and concludes with discussing economic aspects and building trust in e-commerce.

Related: This course complements a shorter Cybersecurity Diplomacy course, which focuses in depth on the risks of cyber-conflict and the related international negotiations.

Methodology

The Cybersecurity online course is based on a collaborative learning approach, involving a high level of interaction over a period of 10 weeks. Reading materials and the necessary tools for online interaction are provided in a virtual classroom.

Each week, participants study and discuss course materials and complete additional online activities. At the end of the week, participants and lecturers meet to discuss the topic of the week. For successful completion, this course requires a minimum of 5 to 7 hours of study time per week.

Participants who successfully complete the course receive a certificate issued by Diplo, which can be printed or shared electronically.

Prerequisites

All course applicants must have regular internet access (broadband is preferred). 

Applicants for certificate courses must have:

  • An undergraduate university degree OR 3 years of work experience and appropriate professional qualifications in diplomacy or international relations
  • Sufficient English language skills to undertake postgraduate-level studies

Fees and scholarships

The fee for this course is €690

Note: Diplo alumni can benefit from a 15% discount on the fee for this course.

Discounts are available for more than one participant from the same institution.

You can apply for this course as:

Financial assistance

A limited scholarship fund is available for diplomats and others working in international relations from developing countries, through support from the governments of Malta and Switzerland.

A limited scholarship fund is also available for civil society applicants working in the field of digital policy, through the general support of the Ford Foundation.

As Diplo's ability to offer scholarship support is limited, candidates are strongly encouraged to seek scholarship funding directly from local or international institutions.

How to apply

Fill out the short form to start your application process for this course. You will receive an instruction email on how to continue.

Applying for financial assistance? Please indicate this on the application form, upload your CV, and a motivation statement that should include:

  • Details of your relevant professional and educational background
  • Reasons for your interest in the course
  • Why do you feel you should have the opportunity to participate in this course? How will your participation benefit you, your institution and/or your country?

Please note that financial assistance from Diplo is available only to applicants from developing countries!

Late applications will only be considered if there are spaces available in the course.

Cancellation policy

Diplo reserves the right to cancel this course if enrolment is insufficient. In case of cancellation, Diplo will notify applicants shortly after the application deadline. Applicants who have paid an application fee may apply this fee towards another course or receive a refund.