International Law of Cyber Operations Executive Course, Cohort 4 (Jan–Apr 2024)
Registration for Cohort 4 is closed.
Master the fundamentals of international cyber law as you watch recorded lectures by the world's leading scholars in the field; meet with the instructors and fellow participants in live sessions; and complete the course with a University of Reading Executive Education certificate.
Expect all this and more from the leading University of Reading certified course in international cyber law. You will have fourteen weeks to complete the coursework. The sessions are split into two blocks, with each of the study periods ending with two live sessions with the faculty.
World-renowned faculty – learn from the leading experts in international cyber law
Independent learning – recorded lectures on topics ranging from sovereignty to the law of armed conflict, split into chunks and concluding with multiple choice tests for a self-paced and structured learning experience
Live sessions – meet with the professors twice for practical case study sessions as well as for two roundtable discussions
Complimentary e-copy of the Tallinn Manual 2.0 on the International Law of Cyber Operations (value 69.99 USD) – receive the key reference source in international cyber law
Certified by the University of Reading – upon successful completion of the course, receive an executive education certificate of completion
Community building – meet colleagues working in international cyber affairs from around the world
Part 1: Learning Objectives
FREE PREVIEWPart 2: History of International Cyber Law
FREE PREVIEWPart 3: Debate on International Cyber Law at the United Nations
FREE PREVIEWPart 4: Sources of International Cyber Law
Part 5: Treaties as a Source of International Cyber Law
Part 6: Treaty Interpretation Rules
Part 7: Custom as a Source of International Cyber Law
Part 8: Crystallisation Versus Interpretation of Customary Cyber Law
Part 9: Subsidiary Sources of International Cyber Law
Part 10: Is "Soft Law" a Source of International Cyber Law?
Part 11: International Cyber Law, Summary
Part 12: Enforcement of International Cyber Law
Part 13: UN Groups of Governmental Experts & Open-Ended Working Groups
Part 14: Confidence-Building Measures for Cyberspace
Test Your Knowledge
Part 1: Learning Objectives
Part 2: Definition of Sovereignty
Part 3: Is Cyberspace a Global Common?
Part 4: Does Sovereignty Apply in Cyberspace and If So, Who Must Respect It?
Part 5: When Do Cyber Operations Violate Sovereignty?
Part 6: Cyber Operations That Breach Territorial Integrity and Inviolability
Part 7: Cyber Operations That Breach Territorial Integrity and Inviolability, Examples
Part 8: Cyber Operations That Interfere With or Usurp Inherently Governmental Functions
Part 9: Sovereignty Violations in Cyberspace, Czech Republic Example
Part 10: Status of Sovereignty as a Rule of International Law in the Cyber Context
Part 11: Unsettled Issues
Part 12: Cyber Operations Against Sovereign Immune Platforms
Part 13: Derivative Principles
Test Your Knowledge
Part 1: Learning Objectives
Part 2: Definition of the Due Diligence Obligation
Part 3: State Views on Due Diligence in the Cyber Context
Part 4: Due Diligence Principle Deconstructed
Part 5: Geography: Where Does a State Bear the Due Diligence Obligation?
Part 6: Threshold of Harm – What Effects Must the Target State Suffer?
Part 7: Threshold of Harm Cont’d – What Effects Must the Target State Suffer?
Part 8: Territorial State's Knowledge of Malicious Cyber Operations
Part 9: Conduct Required of a "Diligent" State – Temporal Factor
Part 10: Conduct Required of a "Diligent" State – Feasibility Factor
Part 11: Remaining Issues
Part 12: Policy Relevance of the Due Diligence Obligation in Cyberspace
Test Your Knowledge
Part 1: Learning Objectives
Part 2: Legal Basis of the Non-Intervention Principle
Part 3: Does the Prohibition of Intervention Apply in Cyberspace?
Part 4: Why is the Prohibition Relevant in Cyberspace and Why Can It Be Difficult to Apply?
Part 5: Non-Intervention as an Inter-State Rule and Its Elements
Part 6: Definition of Internal or External Affairs
Part 7: Definition of Coercion
Part 8: Two Different Concepts of Coercion
Part 9: Examples of Coercive Cyber Operations?
Part 10: Failed Cyber Intervention? Threatened Cyber Intervention? Consensual Intervention?
Part 11: Was Stuxnet Prohibited Intervention?
Part 12: Interference in US 2016 Presidential Elections as Prohibited Intervention?
Part 13: Was Wannacry Prohibited Intervention?
Part 14: Final Thoughts
Test Your Knowledge
Part 1: Learning Objectives
Part 2: Definition of Use of Force and the Prohibition’s Applicability to Cyber Operations
Part 3: Legal Bases for Lawfully Using (Cyber) Force
Part 4: Cyber Operations as Uses of Force
Part 5: Can Cyber Operations with Non-Physical Effects Amount to a Use of Force?
Part 6: Can an Unintentional Cyber Operation Qualify as a Use of Force?
Part 7: Threat of a Cyber Use of Force
Test Your Knowledge
Reach out to us at [email protected]