Cyberspace Policy/Operations & Political Challenges – NSEC 505

CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 09/05/2023

Course Description

This course looks at the current lack of cyber policy, and government operations in cyberspace and how politics creates challenges. Students develop the requirements for a national cyber strategy and review the strategies of the major players in cyber defense, primarily DoD, DHS, FBI, and critical infrastructure organizations. The course considers the issues of cyber sovereignty, international threats and opportunities, and future challenges.

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Rationale

The purpose of this course is to analyze significant current issues between cybersecurity and national security. It is important for the student to have a firm understanding of the issues faced in the dynamic and ever-changing discipline of national security.

Course Assignment

Textbook readings and lecture presentations/notes

Course Requirements Checklist

After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.

Discussions (4)

Discussions are collaborative learning experiences. Therefore, the student is required to provide a thread in response to the provided prompt for each discussion. Each thread must be at least 500 words and demonstrate course-related knowledge. In addition to the thread, the student is required to reply to 2 other classmates’ threads. Each reply must be at least 250 words.

Current Issue and Best Practices Paper: Part 1 and Part 2

Part 1: Will consist of a Topic, Thesis and Annotated Bibliography this will help to ensure that research is adequate and writing is well educated clear and well-thought out.  

Part 2: The student will write an 8-10-page paper on the topic of his or her choosing dealing with an aspect or issue involving cybersecurity and national security. The paper must be in current APA format and include at least 8 sources (which can include the class textbooks and the Bible).

Government Orgainzation Policy Evaluation Research Paper: Part 1, Part 2 & Part 3

Part 1: Will consist of a Topic, Thesis and Annotated Bibliography this will help to ensure that research is adequate and writing is well educated clear and well-thought out.

 Part 2: The student will write a 6-8-page paper on the government organization of his or her choicing dealing with an aspect or issue involving cybersecurity policy of that organization. The paper must be in current APA format and include at least 6 sources (which can include the class textbooks and the Bible).

Part 3: Powerpoint Training Presentation. The student will prepare a 20-slide PowerPoint presentation wherein he or she will design an interagency interdisciplinary course of instruction. The presentation should be designed for entry-level first responder employees who would not be very familiar with homeland security and emergency management issues. The presentation must include at least 5 sources (which may include the class textbooks and the Bible).

The student will use Office Mix, which may be turned into a Windows Media Video WMV, to present and record his or her information. The presentation needs to be at least 15 minutes long and should last no more than 30 minutes maximum.

Analysis/Critique of Major Event Paper

Part 1: Will consist of a Topic, Thesis and Annotated Bibliography this will help to ensure that research is adequate and writing is well educated clear and well-thought out.  

Part 2: The student will write a 6-8-page paper on a major event (disaster, incident, catastrophe or preplanned event) involving homeland security (emergency management focused allowed). The paper must be in current APA format and include at least 6 sources (which can include the class textbooks and the Bible).