• عربي
  • 中文
  • English
  • Français
  • Русский
  • Español
 
  This module is a resource for lecturers  

 

Possible class structure

 

The following is a recommended structure for the class. Students should complete the required readings before coming to class. The lecture is meant to reinforce what they learned in the readings and the exercises are designed to apply what they learned in the readings and the lecture. The following breakdown is designed for a three-hour class. Lecturers can adapt the structure based on their needs and class times.

Introduction and learning outcomes

Lecture  (10 minutes):

  • Provide a brief introduction to the class and its contents
  • Identify and discuss the learning outcomes of the class

[ Optional: Show " ITU-Cybersecurity " video (length: 3:24) and/or " ITU and Cybersecurity: Building confidence in the use of ICT " (length: 1:29) under the " Additional Teaching Tools" section of this Module at the beginning of the class.]

 

Internet governance

Lecture  (30 minutes):

  • Discuss Internet governance and barriers to universal Internet governance
  • Identify Internet principles and the issues that arise in the realization of these principles

Have students complete " Exercise # 1 ~ Internet Principles" under the "Exercises" section of this Module before class and discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].

Use the question posed in " Homework # 1 ~ Barriers to Universal Internet Governance" under the "Student Assessment" section of this Module to facilitate a discussion in class.

 

Cybersecurity strategies: Basic features

Lecture  (20 minutes):

  • Describe the basic features of a cybersecurity strategy
  • Differentiate between cybersecurity and cybercrime prevention strategies
 

National Cybersecurity Strategies

Lecture  (30 minutes):

  • Discuss the objectives of a national cybersecurity strategy
  • Identify the lifecycle of a national cybersecurity strategy
  • Identify where information about national cybersecurity strategies can be found

Have students complete " Exercise # 2 ~ National Cybersecurity Strategies" under the "Exercises" section of this Module before class and discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].

 

Break

Time:  10 minutes

 

International cooperation on cybersecurity matters 

Lecture  (40 minutes):

  • Identify and examine frameworks for international cooperation on cybersecurity issues
  • Evaluate efforts to internationally cooperate on cybersecurity matters

[ Optional: Have students complete " Homework # 3 ~ Case Study: Importance of CERT - Response to the Anna Kournikova virus" under the "Student Assessment" section of this Module before class and discuss their findings during the lecture].

 

Cybersecurity posture

Lecture  (40 minutes):

  • Identify, discuss, and evaluate efforts to enhance countries' cybersecurity posture
  • Assess countries' cybersecurity posture

Ask students to complete " Exercise # 3 ~ Group Exercise: Global Cybersecurity Index" under the "Exercises" section of this Module before class and discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].

[ Optional: Have students complete " Homework # 2 ~ Cybersecurity Capacity Maturity Model" under the "Student Assessment" section of this Module before class and discuss their findings during the lecture. Students can either hand in a one- to three-page summary of their findings or come prepared to discuss their findings in class].

 
Next: Core reading
Back to top