3 ECTS credits
75 u studietijd

Aanbieding 1 met studiegidsnummer 8020278GNR voor alle studenten in het 2e semester met een inleidend niveau.

2e semester
Inschrijving onder examencontract
Niet mogelijk
Beoordeling (0 tot 20)
2e zittijd mogelijk
Faculteit Sociale Wetensch & SolvayBusinessSchool
Verantwoordelijke vakgroep
ES Academische eenheid
Decaan ES (titularis)
Onderdelen en contacturen
9 contacturen Hoorcollege
15 contacturen Zelfstudie en externe werkvormen

This course begins with an examination of five generic but critical functions of cyber security:  the ability to monitor, to detect, to conduct forensic analysis, to attribute and to respond to attacks in the cyber domain.  It then explores the complex community of actors who perform those functions within five distinct ‘cyber domains’ (military, intelligence, law enforcement, homeland security, and the commercial/private sector). The course concludes with a review of current international efforts among the private and public sectors to cooperate more effectively in our increasingly interconnected world.

Students will examine the competing interests among these domains as well as the strategic planning efforts undertaken to address them both separately and collectively.  Case studies of cyber operations are presented so students can both appreciate the real-world challenges of bringing theories into practice and better understand what some are now calling the ‘cool war’.

Cursustekst (Aanbevolen) : International Challenges of the Public-Private Partnership in the Cyber Domain
Bijkomende info

Study material

The syllabus and selected writings will be provided by the professor.  Key readings will include:

  • Mark Russinovich, Zero Day, New York: MacMillan, 2011.
  • Kim Zetter, Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, New York: Crown Publishers, 2014.
  • Richard A. Clarke, Cyber War: The Next Threat to National Security and What to Do About it. New York: Harper Collins, 2010.
  • P.W. Singer and Allan Friedman, Cyber Security and Cyber War:  What Everyone Needs to Know.  New York: Oxford University Press, 2014.
  • Edward Amoroso, Cyber Security, NJ: Silicon Press, 2007.
  • Office of the National Counterintelligence Executive, Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage, Washington D.C: CreateSpace Independent Publishing, 2009-2011.

Complementary study material

Professor will provide a list of additional recommended and suggested readings as needed.


(!) The teaching and assessment format of this course is subject to change if the minimum number of students isn’t reached.


General competences

This is an introductory course on the importance of the cyber domain, a relatively new frontier whose significance cannot be understated in today’s environment of global commerce and communication.  Students will understand the history and evolution of the technologies, laws, and policies that today shape the cyber environment, as well as the many threats—current and emerging.

Students will become familiar with primary source materials on U.S. and international cyber security policies, strategies and laws; intelligence community and private sector threat assessments; how the U.S., NATO and the EU are organized to address competing cyber domain interests; operational examples of cyber offensive and defensive efforts; and, future trends.  Particular attention will be given to understanding how crises can create opportunities for prudent statecraft to advance global cyber security interests.

Students will appreciate the unique challenges posed by the ‘public-private partnership’ to monitor, detect, conduct forensic analysis, attribute attacks and respond to cyber attacks and cyber espionage that threaten economic and national security.

Students will appreciate the constant tensions and difficulties that exist between identifying and prioritizing cyber threats and providing sufficient warning to policy makers so they can manage them effectively and in a timely manner.  Particular attention will be given to the difficulties inherent in cyber forensic analysis and attribution.

Students will analyze and evaluate a spectrum of cyber threats (past, current and future) and the various responses taken, or considered, to assess how effective a crisis was turned into, or could be, an opportunity to advance a nation’s statecraft.


De beoordeling bestaat uit volgende opdrachtcategorieën:
Examen Andere bepaalt 100% van het eindcijfer

Binnen de categorie Examen Andere dient men volgende opdrachten af te werken:

  • Gesimuleerde Oefening met een wegingsfactor 100 en aldus 100% van het totale eindcijfer.

Aanvullende info mbt evaluatie

(!) The teaching and assessment format of this course is subject to change if the minimum number of students isn’t reached.

Toegestane onvoldoende
Kijk in het aanvullend OER van je faculteit na of een toegestane onvoldoende mogelijk is voor dit opleidingsonderdeel.

Academische context

Deze aanbieding maakt deel uit van de volgende studieplannen:
Postgraduate Certificate Economic Diplomacy: Standaard traject (enkel aangeboden in het Engels)
Postgraduate Certificate International Trade and Investment: Standaard traject (enkel aangeboden in het Engels)
Postgraduate Certificate Flagship Programme in Economic Diplomacy and International Business: Standaard traject (enkel aangeboden in het Engels)