<div dir="ltr">Dear NCUC members,<div><br></div><div>As someone who took this course before, I only have good things to say about it. You are encouraged to apply if you want to have some very comprehensive and broad understanding of cyber security.</div></div><div class="gmail_extra"><br clear="all"><div><div dir="ltr">Sincerely,<br><br>Walid<br><br>-----------------<br><br>Walid Al-Saqaf, PhD<br>
</div></div>
<br><div class="gmail_quote">On Fri, Sep 12, 2014 at 4:14 PM, Virginia Paque <span dir="ltr"><<a href="mailto:virginiap@diplomacy.edu" target="_blank">virginiap@diplomacy.edu</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">(Apologies for cross-posting, but I think some of you may be interested) gp<div><br clear="all"><div><div dir="ltr"><div style="font-size:13.3333339691162px;font-family:arial,sans-serif">Colleagues,<br><br></div><span style="font-size:13.3333339691162px;font-family:arial,sans-serif">The call for applications for DiploFoundation's advanced thematic course in Cybersecurity closes in a few days. The course starts in October.</span><br style="font-size:13.3333339691162px;font-family:arial,sans-serif"><div><div style="font-family:arial,sans-serif;font-size:13.3333339691162px"><br>More details about this course is available below or at <a href="http://www.diplomacy.edu/courses/IGCBP-Adv-security" target="_blank">http://www.diplomacy.edu/courses/IGCBP-Adv-security</a>. Please share this announcement with friends or colleagues who may be interested to apply. Thanks!<br><br></div><div style="font-family:arial,sans-serif;font-size:13.3333339691162px">Ginger</div><div><br></div><div><br><h2 style="font-family:arial,sans-serif;font-size:13.3333339691162px">Cybersecurity</h2><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><b>Course details:</b></p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px">Today’s headlines often feature the word ‘cyber’, reporting on threats related to the virtual world: online child abuse, stolen credit cards and virtual identities, malware and viruses, botnets and denial-of-service attacks on corporate or government servers, cyber-espionage, and cyber-attacks on critical infrastructure including nuclear facilities and power supply networks.</p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px">What are the real cybersecurity challenges? What is the role of diplomacy, international legal instruments, and regional and national policies in addresses these threats, and how efficient are they? How does international cooperation in cybersecurity work, and what are the roles of the various stakeholders?</p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px">The 10-week advanced thematic course in Cybersecurity covers policy challenges, actors, and initiatives related to cybersecurity, and specifically to cybercrime, security of the core infrastructure, cyberwarfare and cyberterrorism, and Internet safety.</p><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">By the end of the course, participants should be able to:</p><ul style="font-family:arial,sans-serif;font-size:13.3333339691162px"><li style="margin-left:15px">Identify the defining features of cybersecurity, and the factors which shape the international issues.</li><li style="margin-left:15px">Identify principal threats to cybersecurity; describe and analyse the key cybersecurity issues for users, and states.</li><li style="margin-left:15px">Understand and analyse the Internet security issues for e-commerce including online banking and identity.</li><li style="margin-left:15px">Explain the issues involved in cybercrime, its impact and investigation.</li><li style="margin-left:15px">Understand the threats to the core Internet infrastructure.</li><li style="margin-left:15px">Explain the concepts of cyberwarfare and cyberterrorism, and their role in international Internet policy.</li><li style="margin-left:15px">Understand and assess the challenges involved in social aspects of cybersecurity.</li><li style="margin-left:15px">Explain and analyse the international frameworks for cybersecurity policies and strategies.</li></ul><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">The course forms part of the Thematic Phase of Diplo’s<a href="http://www.diplomacy.edu/courses/IGCBP" target="_blank"> Internet Governance Capacity Building Programme (IGCBP)</a>. This phase offers in-depth courses that provide deeper understanding of a particular issue. Other courses forming part of this phase - which may run simultaneously or at a later date - include <a href="http://www.diplomacy.edu/courses/IGCBP-Adv-ICTstrategy" target="_blank">ICT Policy and Strategic Planning</a>,<a href="http://www.diplomacy.edu/courses/IGCBP-Adv-eparticipation" target="_blank"> E-participation</a>,<a href="http://www.diplomacy.edu/courses/IGCBP-Adv-history" target="_blank"> History of Internet Governance</a>,<a href="http://www.diplomacy.edu/courses/IGCBP-Adv-Infrastructure" target="_blank"> Infrastructure and Critical Internet Resources</a>,<a href="http://www.diplomacy.edu/courses/IGCBP-Adv-IPR" target="_blank"> Intellectual Property Rights</a>, and<a href="http://www.diplomacy.edu/courses/IGCBP-Adv-Privacy" target="_blank"> Privacy and Personal Data Protection</a>.</p><h4 dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">Excerpt from course materials</h4><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px"><em>‘...One side-effect of the rapid integration of the Internet in almost all aspects of human activity is the increased vulnerability of modern society. The Internet is part of the global critical infrastructure. Other core services of modern society, such as electric grids, transport systems, and health services are increasingly dependent on the Internet. As attacks on these systems may cause severe disruption and have huge financial consequences, they are frequent targets.’ </em>(Lexture text 4.3)</p><h4 dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">Course outline</h4><p style="font-family:arial,sans-serif;font-size:13.3333339691162px">The thematic course in Cybersecurity includes one week of hypertext practice and platform familiarisation and introduction, and eight in-depth course texts:</p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><strong>Chapter 1. Introduction to security</strong> discusses the historical development of cybersecurity, and distinguishes between the common, narrow, understanding of cybersecurity related to cyber-threats, and broader views which include information security and ‘friendly’ cyber conquest through technological standardisation dominance.</p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><strong>Chapter 2. Cybersecurity threats and building trust</strong> reviews common security threats to individuals, such as malware (including spyware, Trojans, viruses), phishing, e-scams and identity theft. To better understand the security-enabling infrastructure, the chapter explains the basics of the authentication and Public Key Infrastructure, including PIN codes and other identifiers, randomly generated passwords and e-signatures, and touches upon the challenge of identity and anonymity online. It concludes by looking at ways to build trust in e-commerce and e-services.</p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><strong>Chapter 3. Cybercrime</strong> attempts to define and classify cybercrime while reviewing the history of spam, viruses, intrusion, worms, Trojan horses, denial-of-service attacks and cyber-stalking, and also analyses its economic and social impacts. The chapter then focuses on combatting cybercrime: existing legal frameworks at the global and regional levels, jurisdiction challenges and various law enforcement approaches, computer investigation and e-forensics.</p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><strong>Chapter 4. Security of the core Internet infrastructure</strong> explains briefly how the critical components of the Internet work, and discusses the political dimension of global security - the (unilateral) control over the DNS - and technical vulnerabilities such as domain name hijacking, packet interception, DNS poisoning, and DNS spoofing. The chapter also explains the recent technological security upgrade titled DNSSec, and related technical and policy challenges. It then looks at the expected challenges of future networks: Internet of Things/Next Generation Networks and ‘smart networks’.</p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><strong>Chapter 5. Cyberterrorism and cyberwarfare </strong>looks at the security and protection of the critical infrastructure - the Internet infrastructure and also water supply facilities, transport, industrial facilities and power plants. It discusses cyberterrorism and possible counteracts, and analyses Denial of Service (DoS) attacks. It also discusses cyberwarfare, reviews the attempts to codify international law with regards to cyberwar, and refers to existing international initiatives and norms and their possible application in cyberspace (i.e. the Geneva Conventions).</p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><strong>Chapter 6. Social aspects of cybersecurity</strong>: correlating privacy with security is our first task in this module, with special reflection on social media challenges. We attempt to define online safety, and scan through the challenges of the Web 2.0 era where users are the contributors and the Internet is ubiquitous. We then look at child safety, including cyber-bullying, abuse and sexual exploitation, and violent games, and discuss the ways to address these challenges through policy, education and technology.</p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><strong>Chapter 7. Internet safety</strong>: touching upon openness and online freedoms, we look at some of the main issues faced when dealing with Internet safety, including objectionable and harmful content. We then analyse the reliability of information, and look at ethics, health and gender issues.</p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><strong>Chapter 8. Internet security policies and strategies:</strong> we dive deeply into the existing legal and policy frameworks. We start with the international framework, including the Council of Europe Convention on Cybercrime, the ITU Global Security Agenda, the Commonwealth Cybercrime Initiative and the OSCE. We also look at regional policies and strategies including European Union, African Union and the Organisation of American States. We review business initiatives in the field of cybersecurity, including initiatives by Microsoft, Intel, Cisco, and SAFEcode, and discuss the importance and risks of public-private partnerships.</p><h4 style="font-family:arial,sans-serif;font-size:13.3333339691162px">Reviews</h4><blockquote style="font-family:arial,sans-serif;font-size:13.3333339691162px"><p>‘The course is updated with the latest security issues, so we have a global view of what is going on now, and what organisations are involved at international level in the fight against cybercriminality.’</p></blockquote><blockquote style="font-family:arial,sans-serif;font-size:13.3333339691162px"><p>‘... [the course lecturer] has been very encouraging to think on even the different side which may not be very popular side. So both pros and cons of the issues come to light in the class, encouraging deeper learning.’</p></blockquote><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><b>Who should apply:</b></p><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">Diplo seeks applications from the following, from both developed and developing countries:</p><ul dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px"><li style="margin-left:15px">Officials in government ministries, departments, judicial or regulatory institutions dealing with security and/or ICT-related policy issues (e.g. security and defence, foreign affairs, justice, telecommunications);</li><li style="margin-left:15px">Experts and officials in intergovernmental, international and regional organisations in charge of security cooperation, justice and home affairs, defence or Internet and ICT policy;</li><li style="margin-left:15px">Academics, researchers and postgraduate students in the field of security and/or Internet;</li><li style="margin-left:15px">Professionals from the corporate sector in charge of Internet and security policies;</li><li style="margin-left:15px">Journalists and staff of non-governmental organisations, covering issues of Internet rights and security.</li></ul><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">This course may also be of interest to:</p><ul dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px"><li style="margin-left:15px">Practising diplomats, civil servants, and others working in international relations who want to refresh or expand their knowledge on the subject, under the guidance of experienced practitioners and academics.</li><li style="margin-left:15px">Postgraduate students of diplomacy or international relations wishing to study topics not offered through their university programmes or diplomatic academies and to gain deeper insight through interaction with practising diplomats.</li></ul><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><b>Methodology:</b></p><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">This course is conducted online over a period of ten weeks, including one week of classroom orientation, eight weeks of dynamic class content and activities, and one week for the final assignment. Reading materials and tools for online interaction are provided through an online classroom. Each week, participants read the provided lecture texts, adding comments, references, and questions in the form of hypertext entries. The tutor and other participants read and respond to these entries, creating interaction based on the lecture text. During the week, participants complete additional online activities (e.g. further discussion via blogs or forums or quizzes). At the end of the week, participants and tutors meet online in a chat room to discuss the week’s topic.</p><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">Courses are based on a collaborative approach to learning, involving a high level of interaction. This course requires a minimum of 7-8 hours of study time per week.</p><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">Participants are invited to join Diplo’s global Internet governance online community of over 1,400 members, and to attend monthly webinars and other IG-related events and activities.</p><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">The course materials, the e-learning platform, and the working language of the course is English. Applicants should consider whether their reading and writing skills in English are sufficient to follow postgraduate level materials and discussion.</p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><b>Prerequistes:</b></p><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">Applicants for the certificate course must have:</p><ul dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px"><li style="margin-left:15px">Either completed the course Introduction to Internet Governance, or have equivalent knowledge of Internet governance issues, or experience in the field, or experience of the multistakeholder approach in international affairs;</li><li style="margin-left:15px">Sufficient ability in the English language to undertake postgraduate level studies (including reading academic texts, discussing complex concepts with other course participants, and submitting written essay assignments);</li><li style="margin-left:15px">Regular access to the Internet (dial-up connection is sufficient, although broadband is preferable);</li><li style="margin-left:15px">A minimum of 7-8 hours commitment per week, and the readiness to participate in class online sessions (once a week at specified times).</li></ul><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><b>Fees:</b></p><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">Course fees: <br></p><ul dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px"><li style="margin-left:15px">€650 (Diplo Certificate Course)</li></ul><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">Applicants must pay full fees upon official acceptance into the course. The fee includes:</p><ul dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px"><li style="margin-left:15px">Full tuition</li><li style="margin-left:15px">Course orientation pack where applicable (optional readings)</li><li style="margin-left:15px">Access to all course materials online, via Diplo’s online classroom</li><li style="margin-left:15px">Personal interaction via the online classroom with course lecturers, staff and other participants</li><li style="margin-left:15px">Online technical support</li><li style="margin-left:15px">For Diplo Certificate Courses, postgraduate-level certificate issued by DiploFoundation on successful completion of course requirements (interaction and participation, all assignments)</li></ul><h4 dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">Financial assistance</h4><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">A limited number of partial scholarships (maximum 20%) will be offered to participants from developing and emerging countries. Participants who would like to apply for financial assistance must upload the following documents with their application:</p><ul dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px"><li style="margin-left:15px">a CV or resumé;</li><li style="margin-left:15px">a motivation letter outlining relevant professional and educational background, and interest in the course.</li></ul><p dir="ltr" style="font-family:arial,sans-serif;font-size:13.3333339691162px">As Diplo's ability to offer scholarship support is limited, candidates are strongly encouraged to seek scholarship funding directly from local or international institutions. Our guide to <em><a href="http://www.diplomacy.edu/poolbin.asp?IDPool=725" target="_blank">Finding Scholarships for Online Study</a> </em>may provide you with some useful starting points.</p><p style="font-family:arial,sans-serif;font-size:13.3333339691162px"><b>How to apply:</b></p><div style="font-family:arial,sans-serif;font-size:13.3333339691162px">Applicants for certificate courses should <a href="http://learn.diplomacy.edu/registration/register.php" target="_blank">apply online.</a><p>Late applications will be considered if there are spaces available in the course. Please e-mail <a href="mailto:ig@diplomacy.edu" target="_blank">ig@diplomacy.edu</a> to request a deadline extension.</p><p><strong>Learn more</strong> about <a href="http://www.diplomacy.edu/courses/learning/programmes" target="_blank">certificate and accredited courses</a>, and about <a href="http://www.diplomacy.edu/courses/learning" target="_blank">learning with Diplo</a>.</p><hr><h4>Cancellation Policy</h4><p>Diplo reserves the right to cancel this course if enrolment is insufficient. In case of cancellation, Diplo will notify applicants shortly after the application deadline. Applicants who have paid an application fee may apply this fee towards another course or receive a refund.</p></div></div></div></div></div>
</div></div>
<br>_______________________________________________<br>
Ncuc-discuss mailing list<br>
<a href="mailto:Ncuc-discuss@lists.ncuc.org">Ncuc-discuss@lists.ncuc.org</a><br>
<a href="http://lists.ncuc.org/cgi-bin/mailman/listinfo/ncuc-discuss" target="_blank">http://lists.ncuc.org/cgi-bin/mailman/listinfo/ncuc-discuss</a><br>
<br></blockquote></div><br></div>