Lecturing Portfolio
Dr Craig Jarvis
Lecturer | Cyberterrorism Research | Author | Cyber Threat Intelligence
Most of these lectures are delivered at Oxford, Imperial, and Royal Holloway.
They last between 60 and 180 minutes dependent on degree of interactively.
I've got many more planned. Eventually this will hopefully become a Masters programme in National Security & Emerging Technologies.
SECURITY IN THE DIGITAL AGE
Overviews the Internet’s evolution & introduces key security challenges within this history.
CYBER SECURITY
Investigates how cyber security is achieved within a mutating political & technical environment.
EVOLUTION OF THE HACKER
Charts the genesis of hackers, from their mid-twentieth century origins to present incarnations.
ANATOMY OF HACKING
Dissects how attackers breach networks & achieve their objectives (e.g. disruption, data theft).
DARK WEB
Explores the Dark Web’s mechanics, and how the cyber underworld collaborates.
CYBERCRIME
Explores how criminals have migrated online to exploit societal digitisation.
RANSOMWARE
Studies the threat of extortion attacks disabling enterprises.
THE CRYPTO WARS (CYBER SURVEILLANCE)
Recounts the conflict between citizens & states concerning encryption access.
CYBER ESPIONAGE
Examines the revolutionary impact cyber is having on espionage.
CYBER WARFARE
Focuses on cyber-warfare, drawing extensively on the Russia-Ukraine conflict.
CYBER TERRORISM
Examines extremists use of digital technology before analysing how they utilise hacking.
SEDUCTION & SECRETS: EXTREMIST HONEY TRAPS & HACKING
Follows how extremists use complex social engineering to trick targets into downloading malware downloads
LETHAL CYBER TERRORISM
Assesses whether terrorists can damage property, or harm people, exclusively using cyber.
COUNTERING CYBER THREATS
Analyses how states counter cyber threats, from criminal prosecutions to hacking the hackers.
CYBER PROLIFERATION*
Surveys how cyber capabilities have spread to myriad countries.
ARTIFICIAL INTELLIGENCE & HACKING*
Charts artificial intelligence’s evolution, and its impact on cyber defence and offence.
ATTRIBUTING CYBER COVERT ACTIONS*
Explores the challenges of assigning cyber operations to their originators.
CRYPTO CURRENCIES*
Examines how crypto currencies can enable covert and illegal activities.
DISINFORMATION*
Analyses how information environments can be polluted to the advantage of a threat actor.
*Available Summer 2025
Head of Cyber Security
1 个月Looks great Craig.
Patron of The National Museum of Computing at Bletchley Park. World’s first Professor of Cyber Security Management and Independent Expert in Cyber Innovation, AI, Trust and Ethics. #1 Best Selling Author, BBC Panelist.
2 个月Recommended