International Law of Cybercrime Executive Course
Master the international criminal law and jurisdictional principles that frame accountability for cybercrime.
This on-demand course is your fast track to the public international law framework for countering cybercrime. It focuses on two pillars – international criminal law (ICL) and jurisdiction – so you can identify when cyber conduct engages individual criminal responsibility and where states may legislate, enforce, and adjudicate across borders.
To complete the picture, we explain how international humanitarian law (IHL) guides the identification of cyber war crimes, as well as when cyber operations meet the use of force threshold relevant to establishing the crime of aggression.
Delivered in concise, pre‑recorded videos you can watch anytime, the course is built for government officials, counsel, investigators, diplomats, cyber operators, and researchers. You’ll leave with a practical model you can apply immediately: understand the ICL liability framework (sources, evidence, modes of liability); evaluate cyber conduct across the four core crimes (genocide, crimes against humanity, war crimes, crime of aggression); and determine where states may act to counter online criminal activity (jurisdiction).
World-renowned faculty. You will be learning from leading experts in the world who possess extensive knowledge and practical experience in the field of international law.
Flexible Learning. We understand that your time is valuable. That's why our course is designed to fit into your busy schedule. With 24/7 access to our online learning platform, you can study at your own pace and revisit the course materials whenever necessary. You will have 90 days of unlimited access to the course content, ensuring you have ample time to grasp the concepts and principles effectively.
Engaging Multimedia Content. Learning should be an immersive experience. Our course incorporates a variety of engaging multimedia elements – interactive videos, case studies, real-world scenarios, and quizzes to enhance your understanding and make the learning process enjoyable.
Open to all. There are no mandatory requirements to enroll in this course. Whether you are a legal professional, government official, military personnel, cyber law researcher, or simply interested in expanding your knowledge of international law and cyber operations, this course is open to all.
Part 1: Learning Objectives
Part 2: Jurisdiction in Cyberspace - Definition and Scope
Part 3: Extending Established Jurisdictional Principles Into Cyberspace
Part 4: Types of Jurisdiction
Part 5: Prescriptive Jurisdiction – Territoriality Principle
Part 6: Prescriptive Jurisdiction – Territoriality and the Effects Doctrine
Part 7: Extraterritorial Prescriptive Jurisdiction
Part 8: Enforcement Jurisdiction – Challenges in the Cyber Context
Part 9: Legal Bases for Extraterritorial Enforcement Jurisdiction over Cyber Activities
Part 10: Judicial Jurisdiction over Cyber Activities
Part 11: Jurisdiction over Cyber Activities – Summary
Test Your Knowledge
Learning Objectives
Fundamentals of ICL in the Cyber Context
Ordinary Cyber Criminality versus International Criminal Responsibility
Prosecution of International Crimes: International Criminal Court
Prosecution of International Crimes: Domestic Courts
Proving International Crimes Committed by Cyber Means: Evidence
Modes of Liability
Role of Cyber in International Crimes
Genocide as a Crime Under International Law
Committing or Facilitating Genocide by Cyber Means
Crimes Against Humanity
Commission of Crimes Against Humanity by Cyber Means
War Crimes
Cyber War Crimes
Aggression as a Crime Under International Law
Cyber Crime of Aggression
Key Takeaways
Test Your Knowledge
Part 1: Learning Objectives
Part 2: Definition of Use of Force and the Prohibition’s Applicability to Cyber Operations
Part 3: Legal Bases for Lawfully Using (Cyber) Force
Part 4: Cyber Operations as Uses of Force
Part 5: Can Cyber Operations with Non-Physical Effects Amount to a Use of Force?
Part 6: Can an Unintentional Cyber Operation Qualify as a Use of Force?
Part 7: Threat of a Cyber Use of Force
Test Your Knowledge
Part 1: Learning Objectives
Part 2: Relevance of IHL in Cyberspace
Part 3: Distinguishing IHL from UN Charter Law
Part 4: State Views on the Application of IHL in Cyberspace
Part 5: Classification of Cyber Conflict
Part 6: International Armed Conflict in Cyberspace
Part 7: International Armed Conflict and Proxy Actors in Cyberspace
Part 8: International Armed Conflict Involving Only Cyber Operations?
Part 9: Non-International Armed Conflict in Cyberspace
Test Your Knowledge
Part 1: The Principle of Distinction in Cyber Warfare
Part 2: Definition of Cyber Attack
Part 3: Is a Non-Injurious, Non-Damaging Cyber Operation an Attack Under IHL?
Part 4: Examples of Cyber Attacks Under IHL
Part 5: Military Objectives in Cyberspace
Part 6: Is Dual-Use Cyber Infrastructure a Military Objective?
Part 7: Is Data an Object?
Part 8: State Views on Data as an Object
Part 9: Prohibition of Attacks Against Civilians
Part 10: Persons Who Are Lawful Cyber Attack Targets
Part 11: Prohibition of Indiscriminate Cyber Attacks
Part 12: Prohibition of Cyber Perfidy
Part 13: Proportionality
Part 14: Precautions in Cyber Attack
Part 15: Precautions Against the Effects of Cyber Attack
Part 16: Are Cyber Capabilities "Weapons"?
Test Your Knowledge
Reach out to us at [email protected]