In order to acquire a degree from the program, students must complete 36 credits in total. The first 4 courses on the below list are mandatory courses and the remaining courses are electives. Students can also take 6 credits worth of outside electives from other MA programs with the approval of the program head and program coordinator.
Each CPG course is 3 credits worth.
At the end of the year, a final exam is given to the students, which is 10% of the total grade. Thesis track students are exempt from the final exam.
*Note that these credit requirements apply to non-thesis track students only.
The seminar will focus on this interesting Israeli cyber security eco-system case study. It will start with the theoretical explanation of eco-systems in general and the Israeli strategy to form 3 eco-systems that together have been transformed into a one leading eco-system.
Examining whether and how the introduction of new forms of technologies change the links between citizens and governments, mediated via the media and elections, through challenging existing theories.
The course discusses what the international system is and how this system is affected by the emergence of the cyber domain. From this perspective, the course attempts to explore both how cyber technologies affect international relations, and whether and to what extent IR theories and paradigms are able to provide an account to these interactions. Toward these goals, in each class we consider a key theoretical research illuminating the international system or a specific aspect of it, as well as a research that implements that approach in the study of international relations in the cyber domain.
Human history witnessed technological revolutions in the past: Starting with the technology of Agricultural Revolution some 30,000 years ago, continuing with the Industrial Revolution some 200 years ago and up to the current Information Revolution. Like the former revolutions, the current one has a wide implication on almost every field of our life: Economy, fabric of Society, Security, Political systems etc. The course will describe those implications, and their relation to the dominant technology of our time: the digital computer.
In this course we will consider the different elements of Big Data and its political implications. Concepts such as big data, algorithms and AI have become popular during the past decade but the politics that surrounds them is still not clear enough. We will therefore examine various elements of big data and understand their political motives and implications. Throughout the course we will combine between theoretical works which explain the architecture of big data and algorithms and policy papers which show how governments use them.
The goals of this course are to provide the students understanding of Definitions and meanings of the cyber threat evolution. In addition, a broad understanding of the threat development from the 1990s to present, including a description and analysis of the implications of the threat to the future in the global economic sectors, social, commercial and commercial aspects, national aspects and critical infrastructures, including actual experience with analysis of ‘War Game’ events.
The course is divided to four parts: 1. Two sessions devoted to identifying the main characteristics of strategic thinking on national security; 2. Four sessions demonstrating the evolution of national security considerations in the second half of the 20th century before the new reality profoundly changed the strategic environment. This part will start with a detailed discussion of the revolutionary changes that make the new age; 3.It will focus on the technological instruments and the almost universal accessibility that have often profoundly changed important parts of the social, political, economic and military landscape; 4. Discussing the revolutionary impact of the computing and all-encompassing connectivity, its ever-escalating effects on the cultural, social, political, economic and military environment and the implications of this revolution to national security strategic thinking.
Basics of cyber technologies for non-technologists. The course main topics are: Overview of Cyber Security, Foundations of Cryptology, Hash functions, Basic crypto-techniques, Introduction to Communication Networks, Network Security, Architecture and protocols of the WWW.
The aim of the course is to introduce participants to "Cyberlaw" from a theoretical and practical perspective. "Cyberlaw", the law and policy in the field of information and communication technologies, is in constant development, it shapes and effects the way government, and private organizations innovate and deal with risks. In this course we will survey and analyze "Cyberlaw" from a domestic and international perspective.
The goal of this course is to revisit fundamental ideas in political science and examine how new forms of technology challenge them. By comparing classical texts in political science and contemporary discussions about the same subjects, we aim to understand how questions, which were raised by political scientists throughout history, are understood differently today. What is still deemed relevant and what has fundamentally changed? By paying close attention to actual case studies we will reflect on how real politics challenge political science literature. By the end of the course we shall try to chart a clearer trajectory for politics and society in the 21st century, leaning on the past but looking into the future.
The rapid development of sensors, huge databases, and artificial intelligence is transforming the global economy. New business models are created, balance of power is changing, opportunities & threats are created, and even money itself is changing. In this course, we will analyze the impact of big data on our economic future. Concepts such as creative destruction, knowledge versus data, network effect, dominant design, competence block, and information asymmetry will be reviewed.
The purposes of this course are to provide students with useful tools for engaging in empirical research in political science and to help students understand literature that uses a range of research methods. Students will learn how to think about theoretical problems in terms of empirical models – theory, hypothesis testing, data collection, presentation of research, writing research papers and a thesis. Finally, this class is intended to give students an opportunity to develop their thesis.
In recent years, the field of AI (Artificial Intelligence) has been affecting many aspects of our lives, alongside the cyber revolution. These two fields boost each other. Significant breakthroughs in AI have only been made possible thanks to the development of computing power and the ability to obtain large data volumes in the cyber era. On the other hand, many cyber applications rely on AI algorithms. This course will survey the implications of AI in the cyber era on politics and international affairs. For example, influencing public opinion, cyber operations, and military affairs.
We will extensively introduce AI topics and various machine learning (ML) methods, without going into technical details or math. The course will focus on understanding the idea, motivation, and applications of each method, along with a comprehensive discussion of the real power of various algorithms. We will also examine which cyber applications are based on different AI algorithms, where do they fail, and why. The student will gain a broad understanding of these topics, and ability of critical reading of articles dealing with various aspects of AI methods and their impact on the cyber era, and our lives.
This course focuses on the conduct of dominant countries in cyberspace, to reshape the post-World War II balance of power by exploiting cyberspace to achieve economic, political, and international security gains. The first part of the course will be dedicated to introducing some leading theories and concepts on international security, and to understand the broader geopolitical interests of the major cyber powers and the centrality of cyberspace in the global struggle for power.In the final part of the course, the positions of the cyber powers will be confronted with each other as reflected in the UN Group of Governmental Experts (GGE) dialog, to establish a global cybersecurity regulation mechanism. Towards the end of this part, we will see how the complexities of cybersecurity regulation share some similarities with Lethal Autonomous Weapons (LAWs) regulation complexities, and conclude with a class simulation that summarises the course.