This course will teach the student to identify the ways that computers can be used by terrorists and criminals. Students completing this course will be able to appraise and assess the potential of different kinds of cyber attacks. The course examines technological advancements on the horizon and the opportunities they may present for terrorists, as well as how one can devise plans, countermeasures, and contingencies against future attacks. Students will also learn how to determine the efficacy of current U.S. policy regarding critical infrastructure protection and future avenues for addressing the threat.
Demonstrate the ability to employ various information sources and technology to research how the Internet can be used as a weapon.
Describe and evaluate the concept of hacktivists mobilizing for the future.
Define the role of critical infrastructures
Identify and discuss theories and threats that computers and the Internet provide to terrorists and criminals.
Discuss the PDD-63 and describe the government’s role in combating cyberterrorism
Communicate effectively in all mediums and inform stakeholders about the main areas of strategic technology and early warning from cyberterrorism.
To request an application or get information about any of our strategic security programs, fill out the form below. An Admissions Advisor will be in touch within one business day to answer your questions. Or contact us directly at 888-852-8746
email@example.com ext. 1