Why the Sovereignty Package?

In today's interconnected world, cyber operations have become an integral part of statecraft and international relations. As technology advances, so do the complexities and challenges surrounding cyber operations and their legal implications. The International Law of Cyber Operations: Sovereignty Package Course is designed to provide you with a comprehensive understanding of how sovereignty, as well as its derivate rules and principles of jurisdiction, due diligence and the prohibition of intervention, regulate states' activities in the digital realm.


    5 hours of captioned video lessons on complex legal concepts, split into bite-sized, manageable chunks for a self-paced and effective learning experience. Multiple choice tests to assess understanding of the subject matter.


    Government officials working in cyber affairs, including lawyers, diplomats, policy makers, cyber operators; staff of international organizations and NGOs; employees of technology companies; attorneys; international law scholars and students.


    Upon registration you will gain immediate access to the entire course content for 90 days.


Michael Schmitt

Professor Michael Schmitt is the Director of Legal Affairs at Cyber Law International. He is also Professor of Public International Law at the University of Reading, the G. Norman Distinguished Scholar at the Lieber Institute of the United States Military Academy at West Point, Strauss Center Distinguished Scholar and Visiting Professor of Law at the University of Texas, Charles H. Stockton Distinguished Scholar in Residence at the United States Naval War College’s Stockton Center for International Law, and Senior Fellow at the NATO Cooperative Cyber Defence Centre of Excellence.

Marko Milanovic

Professor Marko Milanovic is of-counsel with Cyber Law International. He is also Professor of Public International Law at the University of Reading, Senior Fellow at the NATO Cooperative Cyber Defence Centre of Excellence, and co-editor of EJILTalk, the blog of the European Journal of International Law. Professor Milanovic has held visiting professorships at Michigan Law School, Columbia Law School, Deakin Law School, the University of the Philippines College of Law, and the Geneva Academy of International Humanitarian Law and Human Rights. He has served as counsel and advisor in proceedings before the International Court of Justice, the European Court of Human Rights, and the Constitutional Court of Serbia.

Sovereignty Package Features

  • World-renowned faculty. You will be learning from leading experts in the world who possess extensive knowledge and practical experience in the field of international law.

  • Flexible Learning. We understand that your time is valuable. That's why our course is designed to fit into your busy schedule. With 24/7 access to our online learning platform, you can study at your own pace and revisit the course materials whenever necessary. You will have 90 days of unlimited access to the course content, ensuring you have ample time to grasp the concepts and principles effectively.

  • Engaging Multimedia Content. Learning should be an immersive experience. Our course incorporates a variety of engaging multimedia elements – interactive videos, case studies, real-world scenarios, and quizzes to enhance your understanding and make the learning process enjoyable.

  • Open to all. There are no mandatory requirements to enroll in this course. Whether you are a legal professional, government official, military personnel, cyber law researcher, or simply interested in expanding your knowledge of international law and cyber operations, this course is open to all.


    1. Part 1: Learning Objectives

    2. Part 2: Definition of Sovereignty

    3. Part 3: Is Cyberspace a Global Common?

    4. Part 4: Does Sovereignty Apply in Cyberspace and If So, Who Must Respect It?

    5. Part 5: When Do Cyber Operations Violate Sovereignty?

    6. Part 6: Cyber Operations That Breach Territorial Integrity and Inviolability

    7. Part 7: Cyber Operations That Breach Territorial Integrity and Inviolability, Examples

    8. Part 8: Cyber Operations That Interfere With or Usurp Inherently Governmental Functions

    9. Part 9: Sovereignty Violations in Cyberspace, Czech Republic Example

    10. Part 10: Status of Sovereignty as a Rule of International Law in the Cyber Context

    11. Part 11: Unsettled Issues

    12. Part 12: Cyber Operations Against Sovereign Immune Platforms

    13. Part 13: Derivative Principles

    14. Test Your Knowledge

    1. Part 1: Learning Objectives

    2. Part 2: Definition of the Due Diligence Obligation

    3. Part 3: State Views on Due Diligence in the Cyber Context

    4. Part 4: Due Diligence Principle Deconstructed

    5. Part 5: Geography: Where Does a State Bear the Due Diligence Obligation?

    6. Part 6: Threshold of Harm – What Effects Must the Target State Suffer?

    7. Part 7: Threshold of Harm Cont’d – What Effects Must the Target State Suffer?

    8. Part 8: Territorial State's Knowledge of Malicious Cyber Operations

    9. Part 9: Conduct Required of a "Diligent" State – Temporal Factor

    10. Part 10: Conduct Required of a "Diligent" State – Feasibility Factor

    11. Part 11: Remaining Issues

    12. Part 12: Policy Relevance of the Due Diligence Obligation in Cyberspace

    13. Test Your Knowledge

    1. Part 1: Learning Objectives

    2. Part 2: Legal Basis of the Non-Intervention Principle

    3. Part 3: Does the Prohibition of Intervention Apply in Cyberspace?

    4. Part 4: Why is the Prohibition Relevant in Cyberspace and Why Can It Be Difficult to Apply?

    5. Part 5: Non-Intervention as an Inter-State Rule and Its Elements

    6. Part 6: Definition of Internal or External Affairs

    7. Part 7: Definition of Coercion

    8. Part 8: Two Different Concepts of Coercion

    9. Part 9: Examples of Coercive Cyber Operations?

    10. Part 10: Failed Cyber Intervention? Threatened Cyber Intervention? Consensual Intervention?

    11. Part 11: Was Stuxnet Prohibited Intervention?

    12. Part 12: Interference in US 2016 Presidential Elections as Prohibited Intervention?

    13. Part 13: Was Wannacry Prohibited Intervention?

    14. Part 14: Final Thoughts

    15. Test Your Knowledge

    1. Part 1: Learning Objectives

    2. Part 2: Jurisdiction in Cyberspace – Definition and Scope

    3. Part 3: Extending Established Jurisdictional Principles Into Cyberspace

    4. Part 4: Types of Jurisdiction

    5. Part 5: Prescriptive Jurisdiction – Territoriality Principle

    6. Part 6: Prescriptive Jurisdiction – Territoriality and the Effects Doctrine

    7. Part 7: Extraterritorial Prescriptive Jurisdiction

    8. Part 8: Enforcement Jurisdiction – Challenges in the Cyber Context

    9. Part 9: Legal Bases for Extraterritorial Enforcement Jurisdiction over Cyber Activities

    10. Part 10: Judicial Jurisdiction over Cyber Activities

    11. Part 11: Jurisdiction over Cyber Activities – Summary

    12. Test Your Knowledge

About This Course

  • 56 lessons
  • 5 hours of video content
  • Access for 90 days

Watch a sample lesson

Upgrade to Full Course

We understand that your thirst for knowledge may extend beyond the scope of the Sovereignty Package Course. As a participant in the International Law of Cyber Operations: Sovereignty Package Course, you have the exclusive opportunity to upgrade at any time to the full University of Reading certified International Law of Cyber Operations Executive Course. This program provides a deeper dive into the intricacies of international cyber law, offering a more comprehensive learning experience.

By upgrading, you will gain access to additional modules, expert-led live webinars, and exclusive learning resources. You'll have the chance to engage in advanced discussions and explore cutting-edge topics in international cyber law, including emerging challenges and legal responses.

To make this upgrade seamless, we will deduct the full amount of the Sovereignty Package Course fee from the International Law of Cyber Operations Executive Course tuition. This means you can continue your learning journey without any financial loss.

For more information about the International Law of Cyber Operations Executive Course, please visit the course website. To secure your upgrade, contact us at [email protected].

Have questions? Is your organisation interested in supporting our scholarship programme?

Reach out to us at [email protected]