International Law of Cyber Operations Executive Course, Cohort 7 (January–April 2025)
Master the fundamentals of applying international law in cyberspace by joining the next global group of participants.
Master the fundamentals of international cyber law as you watch recorded lectures by the world's leading scholars in the field; meet with the instructors and fellow participants in live sessions; and complete the course with a University of Reading Executive Education certificate.
Expect all this and more from the leading University of Reading certified course in international cyber law. You will have fourteen weeks to complete the coursework. The sessions are split into two blocks, with each of the study periods ending with two live sessions with the faculty.
World-renowned faculty – learn from the leading experts in international cyber law
Independent learning – recorded lectures on topics ranging from sovereignty to the law of armed conflict, split into chunks and concluding with multiple choice tests for a self-paced and structured learning experience
Live sessions – meet with the professors twice for practical case study sessions as well as for two roundtable discussions
Complimentary e-copy of the Tallinn Manual 2.0 on the International Law of Cyber Operations (value 69.99 USD) – receive the key reference source in international cyber law
Certified by the University of Reading – upon successful completion of the course, receive an executive education certificate of completion
Community building – meet colleagues working in international cyber affairs from around the world
Part 1: Learning Objectives
FREE PREVIEWPart 2: History of International Cyber Law
FREE PREVIEWPart 3: Debate on International Cyber Law at the United Nations
FREE PREVIEWPart 4: Sources of International Cyber Law
Part 5: Treaties as a Source of International Cyber Law
Part 6: Treaty Interpretation Rules
Part 7: Custom as a Source of International Cyber Law
Part 8: Crystallisation Versus Interpretation of Customary Cyber Law
Part 9: Subsidiary Sources of International Cyber Law
Part 10: Is "Soft Law" a Source of International Cyber Law?
Part 11: International Cyber Law, Summary
Part 12: Enforcement of International Cyber Law
Part 13: UN Groups of Governmental Experts & Open-Ended Working Groups
Part 14: Confidence-Building Measures for Cyberspace
Test Your Knowledge
Part 1: Learning Objectives
Part 2: Definition of Sovereignty
Part 3: Is Cyberspace a Global Common?
Part 4: Does Sovereignty Apply in Cyberspace and If So, Who Must Respect It?
Part 5: When Do Cyber Operations Violate Sovereignty?
Part 6: Cyber Operations That Breach Territorial Integrity and Inviolability
Part 7: Cyber Operations That Breach Territorial Integrity and Inviolability, Examples
Part 8: Cyber Operations That Interfere With or Usurp Inherently Governmental Functions
Part 9: Sovereignty Violations in Cyberspace, Czech Republic Example
Part 10: Status of Sovereignty as a Rule of International Law in the Cyber Context
Part 11: Unsettled Issues
Part 12: Cyber Operations Against Sovereign Immune Platforms
Part 13: Derivative Principles
Test Your Knowledge
Part 1: Learning Objectives
Part 2: Definition of the Due Diligence Obligation
Part 3: State Views on Due Diligence in the Cyber Context
Part 4: Due Diligence Principle Deconstructed
Part 5: Geography: Where Does a State Bear the Due Diligence Obligation?
Part 6: Threshold of Harm – What Effects Must the Target State Suffer?
Part 7: Threshold of Harm Cont’d – What Effects Must the Target State Suffer?
Part 8: Territorial State's Knowledge of Malicious Cyber Operations
Part 9: Conduct Required of a "Diligent" State – Temporal Factor
Part 10: Conduct Required of a "Diligent" State – Feasibility Factor
Part 11: Remaining Issues
Part 12: Policy Relevance of the Due Diligence Obligation in Cyberspace
Test Your Knowledge
Part 1: Learning Objectives
Part 2: Legal Basis of the Non-Intervention Principle
Part 3: Does the Prohibition of Intervention Apply in Cyberspace?
Part 4: Why is the Prohibition Relevant in Cyberspace and Why Can It Be Difficult to Apply?
Part 5: Non-Intervention as an Inter-State Rule and Its Elements
Part 6: Definition of Internal or External Affairs
Part 7: Definition of Coercion
Part 8: Two Different Concepts of Coercion
Part 9: Examples of Coercive Cyber Operations?
Part 10: Failed Cyber Intervention? Threatened Cyber Intervention? Consensual Intervention?
Part 11: Was Stuxnet Prohibited Intervention?
Part 12: Interference in US 2016 Presidential Elections as Prohibited Intervention?
Part 13: Was Wannacry Prohibited Intervention?
Part 14: Final Thoughts
Test Your Knowledge
Part 1: Learning Objectives
Part 2: Definition of Use of Force and the Prohibition’s Applicability to Cyber Operations
Part 3: Legal Bases for Lawfully Using (Cyber) Force
Part 4: Cyber Operations as Uses of Force
Part 5: Can Cyber Operations with Non-Physical Effects Amount to a Use of Force?
Part 6: Can an Unintentional Cyber Operation Qualify as a Use of Force?
Part 7: Threat of a Cyber Use of Force
Test Your Knowledge
"The International Law of Cyber Operations Executive Course was exceptional, and I cannot recommend it highly enough. It was an absolute delight to participate in.
The creators of the course material and the professors delivering the lectures were clearly subject matter experts, and their expertise shone through in their ability to structure the course content and explain complex topics in a clear and concise manner. The lectures were engaging and provided valuable insights.
Overall, I highly recommend this course to anyone looking to gain knowledge and skills in the nascent field of International Cyber Law. It truly exceeded my expectations."
Vafa Izadinia, Head of Information Security, Global non-profit organization (Cohort 1)
• • •
"This short course really helped me gain a thorough understanding of international cyber law. As a participant with no legal background, it was extremely beneficial in my daily tasks in preparing cybersecurity policies for my country."
Shamzarina binti Abdul Razak, National Cyber Security Agency, Malaysia (Cohort 3)
• • •
"As a Military Officer and Cyber Operator, and soon to be a planner in higher echelon, this course is very relevant and responsive to the current cyber operating environment. Going back to the basics, to quote Sun Tzu, "Know Your Enemy and Know Yourself.""
Lieutenant Colonel Rodrigo Quinto, Philippine Army Cyber Battalion (Cohort 3)
• • •
"You will come away from this course with a comprehensive and deep understanding of how the rules of international law apply in cyberspace and (just as importantly) the areas where the law is still unsettled. The lectures are fascinating and easy to digest, and the roundtables and live seminars help cement your knowledge as you apply the rules of international law to fictional cyber incident scenarios. This course is essential for international law practitioners."
Alex Preve, Associate Attorney, Coblentz Patch Duffy & Bass LLP, San Francisco, California, USA (Cohort 3)
• • •
"This course was very helpful for me and my organization as I can apply all of my new knowledge to cybersecurity best practices. Thank you for giving me the opportunity to take this course."
Lieutenant Colonel Yanin Surapanpairoge, Chief, Policy and Plans Section, Cyber Centre, Ministry of Defence, Thailand (Cohort 3)
• • •
"I am thoroughly impressed! The course masterfully bridges the gap between theoretical knowledge and practical application and the lecturers help you realize how applicable cyber law is! This course is not just an educational experience but an essential resource for anyone looking to navigate the complex and evolving - and very interesting - landscape of international law & cyber."
Goran Sandić, Researcher at University of Belgrade and Coordinator at Belgrade International Law Circle (Cohort 3)
• • •
"As a recent participant in the International Law of Cyber Operations Executive Course, I am delighted to share my experience. This course has been a transformative journey for me, broadening my understanding and deepening my appreciation of the International Law of Cyber Operations. The comprehensive curriculum and interactive and engaging teaching methods made complex concepts approachable and enjoyable."
Captain Khalifa Alkuwari, Ministry of Interior, Qatar and PhD candidate, University of Bradford, UK (Cohort 3)
• • •
"I find this course really helpful as it helps me to understand the global context in regards to cyber and its potential use and impacts on the global crises as far as International Law is concerned."
John Jack, OGCIO, Vanuatu (Cohort 4)
• • •
"I highly recommend this course to anyone seeking to deepen their understanding of international law in the realm of cyber operations. I gained a deep understanding of the legal frameworks governing cyber operations globally. From the principles of sovereignty in cyberspace to the nuances of international treaties and conventions, every aspect was covered. The course not only enhanced my professional expertise but also equipped me with the knowledge and confidence to navigate the complex landscape of cyber law with precision and proficiency."
Vee Asuncion, Lawyer/ Investigation Agent, National Bureau of Investigation Cybercrime Division, Philippines (Cohort 4)
• • •
"A thoughtful walk-through of some of the basic features and challenges of international cyber law as it is emerging today."
Bram Abramson, Canadian Radio-television and Telecommunications Commission (Cohort 4)
• • •
"If you're looking for a thought provoking, well balanced and expertly presented analysis of Cyberlaw within the International Legal Framework, there is no other course like this that will expose you to the established, question the present and provoke discussion on what is to come. With expert leaders in the field presenting and available for discussion, this course stands unique in its domain."
Jonathan Sinclair, Sinclair And Associates (Cohort 4)
• • •
"This course was highly informative and educational, even to those who were not necessarily well acquainted with the principles of international law. This course is excellent for those who intend have an in-depth look at international law from a cyber perspective."
Yovin Nirvanesh Naidu, Legal Officer, Office of the Attorney General, Fiji (Cohort 5)
Reach out to us at [email protected]