Introduction

Today we all live and work in a participatory cyberspace. Computers, the data networks that interconnect them, and the services available over the networks make up this cyberspace. As cyberspace invades almost all areas of modern day living, playing, and working, it is becoming more important that people understand its technical and political underpinnings and operations, as well as its capabilities, threats, and weaknesses. This is a companion course to CSCI E-45a. The goal of this pair of courses is to give students the tools they need to understand, use, and manage the technologies involved, as well as the ability to appreciate the legal, social, and political dynamics of this ever expanding universe and the interplay between the cyber and physical worlds. The pair of courses covers the essential elements of computing and the history, structure, operation, and governance of the Internet. This course explores the technical and legal aspects of the interactions and tensions between security, usability, privacy, and surveillance in a post NSA-revelation world. We also look at the technical and legal underpinnings that affect the use of cyberspace for businesses. Finally, we explore the rapidly changing dangers of cyberspace from viruses to state-sponsored cyber-conflict.

Related Certificates & Degrees

This course may be applied toward one of the following credentials at Harvard Extension School:

See other graduate degrees and certificates.

Meet The Faculty

Scott Bradner

Scott Bradner

Senior Technology Consultant, Harvard University
Benoit Gaucherin

Benoit Gaucherin

Deputy Chief Information Officer, Harvard University

Education

  • Maitrise Universite de Caen Basse-Normandie

 

Course Provided By

Back To Top