This course examines the cyberspace strategies used by the United States, key nations, and non-state actors. Students examine relevant policies and constraints which will significantly impact strategies and achieving desired goals. Cyberspace risks, conflicts, and potential resolutions are proposed and discussed within this course.
- Students evaluate cyberspace leadership, operational features, strategic trends, and enforcement and dispute mechanisms.
- They assess the cyberspace strategies employed by individual citizens, the federal government, private industry, non-governmental organizations, transnational and international organizations, and organized crime.
- Students examine the consequences, repercussions, and likely outcomes.