You updated your password.

Reset Password

Enter the email address you used to create your account. We will email you instructions on how to reset your password.

Forgot Your Email Address? Contact Us

Reset Your Password


Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

The answers to your cybersecurity concerns do not involve robocops-they involve brain power and simple diligence.
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is rated 4.3 out of 5 by 90.
  • y_2024, m_7, d_24, h_7
  • bvseo_bulk, prod_bvrr, vn_bulk_3.0.42
  • cp_1, bvpage1
  • co_hasreviews, tv_6, tr_84
  • loc_en_CA, sid_9523, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING)]
  • clientName_teachco
  • bvseo_sdk, p_sdk, 3.2.1
  • CLOUD, getAggregateRating, 6.77ms
Rated 5 out of 5 by from a bit scary excellent presentation. While dated, that's not the Prof's fault - Teaching Co needs to engage an update. Lot of very good insight; makes a strong point for the need for security & adequate prevention steps.
Date published: 2024-05-28
Rated 5 out of 5 by from Great knowledge! All courses are are educational. I do need some that explain Real Estate Investing & it's strategies!
Date published: 2022-05-07
Rated 2 out of 5 by from Good Introduction But Dated As a relatively naive person in this area, I was looking for an introduction and orientation. This course provided this at a high level. Those looking for nuts and bolts information will be disappointed. The course was created in 2013. It badly needs updating.
Date published: 2022-04-02
Rated 1 out of 5 by from Outdated A lawyer talks about computer security. A few amusing anecdotes, but little practical value. No better than 3-star when released in 2013, now badly outdated. Not recommended.
Date published: 2021-09-20
Rated 2 out of 5 by from Old References. This is the worst thing you can do when talking about the fast moving world Cyber security. Instructor constantly used references from 2011-12.
Date published: 2021-03-07
Rated 4 out of 5 by from Good overall 2013 perspective on cybersecurity Be aware this is from a high level lawyer's perspective who advises super large corporations and governments about how the leader, namely the US government does things. If you want to know the thoughts of those leaders are, he's your guy. Having said that, I'd like to see an update covering ransomeware and some other recent developments, especially scams made possible by Bitcoin.
Date published: 2020-12-30
Rated 3 out of 5 by from Complicated course not easy to follow I don't consider myself to be computer literate or knowledgeable so I had difficulty understanding this course. The Professor spelled things out in great detail but I found little of it useful. He tended to focus too much on the problems facing Governments more than the personal user and so his ideas were always much bigger than I had anticipated. And he tended to lecture as if he was presenting a case to congress rather than a home viewer. This wasn't a bad course concerning how the internet works and the problems it has created but I found no real answers in the lectures. It is more a history of cybercrime than a manual on how to fix any problems that I may incur.
Date published: 2020-11-02
Rated 4 out of 5 by from Very informative, but... This is a surprisingly thorough introduction to the world of Cybersecurity. The professor is knowledgeable and presents the material very effectively. All in all, I'm very satisfied. However, and this is a big however, this is a rapidly evolving field of technology and law and the course materials are already noticeably dated. Writing this review in the summer of 2020 I note that all of the examples of cyber crime, cyber laws, terrorist attacks, supreme court decisions, and everything else in this course date to no later than 2012, most are from 2010 or before. That's a lifetime ago in terms of the cyber world. In fact, where the professor mentions during the lectures that, "the Supreme Court hasn't looked at this issue yet," in the intervening eight years they have done so repeatedly. Great course, great presenter, great value, but it's way past time for a re-fresh.
Date published: 2020-07-27
  • y_2024, m_7, d_24, h_7
  • bvseo_bulk, prod_bvrr, vn_bulk_3.0.42
  • cp_1, bvpage1
  • co_hasreviews, tv_6, tr_84
  • loc_en_CA, sid_9523, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING)]
  • clientName_teachco
  • bvseo_sdk, p_sdk, 3.2.1
  • CLOUD, getReviews, 5.04ms


Learn how to protect yourself from cyber crime with this fascinating and timely course by an expert in cybersecurity law and policy.


Paul Rosenzweig

If you've learned anything in this course, I hope it is that cyberspace is remarkable and useful precisely because it is open and unstructured.


The George Washington University Law School

Paul Rosenzweig is a Professorial Lecturer in Law at The George Washington University Law School. He earned his JD from the University of Chicago Law School and then served as a law clerk to the Honorable R. Lanier Anderson III of the United States Court of Appeals for the Eleventh Circuit. He was chosen as the 15th annual Sommerfeld Lecturer at The Judge Advocate General’s Legal Center and School and was awarded a Carnegie Fellowship at Northwestern University’s Medill School of Journalism. In his nonacademic endeavors, Mr. Rosenzweig is a senior fellow at the R Street Institute, a public policy think tank in Washington DC. He is also the founder of Red Branch Consulting PLLC, a homeland security consulting company, as well as a senior advisor to The Chertoff Group. Mr. Rosenzweig formerly served as Deputy Assistant Secretary for Policy in the US Department of Homeland Security, and he is currently a distinguished visiting fellow at the Homeland Security Studies and Analysis Institute. He is also an advisor to the American Bar Association’s Standing Committee on Law and National Security and a contributing editor of the Lawfare blog. Mr. Rosenzweig is the author of Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World, coauthor of Winning the Long War: Lessons from the Cold War for Defeating Terrorism and Preserving Freedom, and coeditor of both National Security Law in the News: A Guide for Journalists, Scholars, and Policymakers and Whistleblowers, Leaks, and the Media: The First Amendment and National Security. Mr. Rosenzweig’s other Great Courses are Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare and The Surveillance State: Big Data, Freedom, and You.

By This Professor

Investigating American Presidents
The Surveillance State: Big Data, Freedom, and You
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare


Stuxnet-The First Cyber Guided Missile

01: Stuxnet-The First Cyber Guided Missile

Your introduction to the fascinating-and fascinatingly dangerous-world of cybersecurity begins with the story of "Stuxnet." Learn how this unique piece of malware, which shut down a uranium enrichment facility in Iran, signaled the dawn of a new age in which viruses and other cyber threats can manipulate the physical world.

32 min
The Incredible Scope of Cyberspace

02: The Incredible Scope of Cyberspace

What makes the Internet so vulnerable is its ability to connect, and to be connected to, anyone and almost anything. Here, explore how cyberspace works. You'll learn what goes on behind the scenes of a simple Internet search, how a simple TCP/IP system functions, the five layers of connections that make up a conceptual "map" of cyberspace, and more.

30 min
The Five Gateways of Internet Vulnerability

03: The Five Gateways of Internet Vulnerability

Take a closer look at the cyber domain's inherent vulnerability to cyber threats. Professor Rosenzweig explains the five key gateways to this vulnerability, including the Internet's ability to destroy time and space; allow users to act in ways they can't in the physical world; and operate without international boundaries.

30 min
Of Viruses, Botnets, and Logic Bombs

04: Of Viruses, Botnets, and Logic Bombs

Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers like puppets). Then, investigate some common defense mechanisms that help pinpoint and capture these threats.

32 min
The Problem of Identity on the Network

05: The Problem of Identity on the Network

Identification is perhaps the single most profound challenge for cybersecurity today. In this lecture, delve into the question of network anonymity and identity. Who maintains domain names? How can people obscure their identities for malicious purposes? How are network designers fighting back against this threat? What are the ethical problems involved in this issue?

33 min
Cyber Fraud, Theft, and Organized Crime

06: Cyber Fraud, Theft, and Organized Crime

Professor Rosenzweig leads you on an examination of all-too-common instances of cybercrime that involve fraud and identity theft. You'll encounter crimes that mimic real-world ones (with a computer as the "weapon") and "computer crimes" that are only possible in the cyber world. Then, find out how law enforcement authorities are fighting back against organized, international cyber criminals.

31 min
Hacktivists and Insurgency

07: Hacktivists and Insurgency

Enter the netherworld of hacktivism, or the use of computer hacking methods to stage protests and make political statements. In this lecture, learn to identify and distinguish the "good guys" from the "bad guys" by exploring real-world examples that illustrate the three major types of hacktivists: political activists, cyber insurgents, and mischief makers.

31 min
Nations at Cyber War

08: Nations at Cyber War

Turn now to the highest level of cyber conflict: a cyber war between nation-states. What is meant by the term "cyber war"? How does one fight a battle in cyberspace? What do the enemies look like? Do traditional international rules of armed conflict apply? How do we counter such an attack-and should we?

33 min
Government Regulation of Cyberspace

09: Government Regulation of Cyberspace

Join the debate about government regulation of cyberspace with this lecture that considers both sides of the issue. By looking at the debate in America over government oversight of cybersecurity (and whether we even need it at all), you'll be better informed about a topic that has serious ramifications for how you use the Internet.

32 min
International Governance and the Internet

10: International Governance and the Internet

Continue exploring rules and regulations about the Internet, this time on the international level. First, Professor Rosenzweig discusses existing Internet governance and the dynamics leading to change. Then, he assesses some of the barriers to effective international governance of the Internet. Is the current structure, with all of its flaws, better than the alternatives?

35 min
The Constitution and Cyberspace

11: The Constitution and Cyberspace

Return to American policies on cybersecurity, this time focusing on the idea of government monitoring of the Internet. Start by learning all about how on-network monitoring systems work. After that, step back and examine how government monitoring is enforced and limited-but not prohibited-by the Constitution.

33 min
Big Data-

12: Big Data-"They" Know Everything about You

In the first of two lectures on personal data tracking and privacy, ponder the problem of "Big Data"-where your Internet searches can be tracked, your cellphone can broadcast your geographical location instantly, and your online purchases can be catalogued. It's a frightening aspect of cybersecurity, and one that, unfortunately, is here to stay.

32 min
Privacy for the Cyber Age

13: Privacy for the Cyber Age

It appears our current conceptions of privacy in cyberspace will disappear. So what can we do about it? By exploring how the government and private sector use "Big Data"-and how "Big Data" can keep the government honest-you'll discover insights into how we can evolve our privacy laws while embracing new technologies.

33 min
Listening In and Going Dark

14: Listening In and Going Dark

Learn how encryption and wiretapping work in cyberspace, and how both methods are becoming increasingly frustrating for law enforcement and national security officials. This "going dark" phenomenon, as you'll find in this eye-opening discussion, brings benefits and causes problems-and the solutions seem to bring problems of their own.

34 min
The Devil in the Chips-Hardware Failures

15: The Devil in the Chips-Hardware Failures

Hardware-based threats are one of the most vexing problems in the entire cybersecurity domain. How do we know that our machines will actually do what we tell them to do? Why is compromised hardware such a critical threat to cybersecurity? What are some possible solutions for dangers hidden in computer chips?

31 min
Protecting Yourself in Cyberspace

16: Protecting Yourself in Cyberspace

Get practical tips on how to reduce your own risk of danger online in your professional and personal life. You'll find out how to choose the most effective passwords, how to set up the most effective personal computer security systems, how to encrypt and erase personal data and documents, and much more.

31 min
Critical Infrastructure and Resiliency

17: Critical Infrastructure and Resiliency

Take an alternate approach to cybersecurity, this time focusing on resiliency and recovery. There may be good reason to think that creating a system that isn't immune to failure but is less likely to be attacked-and better able to operate even while under attack-is the best course of action.

32 min
Looking Forward-What Does the Future Hold?

18: Looking Forward-What Does the Future Hold?

Finish the course with a helpful summary of the main issues and arguments involved in the current state of cybersecurity throughout the world. Then, take an intriguing peek into the future to explore possible-and even radical-new developments that may shape this powerful and important topic for years to come.

36 min