Lecturing Portfolio
Image Credit: DeepAI

Lecturing Portfolio

Most of these lectures are delivered at Oxford, Imperial, and Royal Holloway.

They last between 60 and 180 minutes dependent on degree of interactively.

I've got many more planned. Eventually this will hopefully become a Masters programme in National Security & Emerging Technologies.

SECURITY IN THE DIGITAL AGE

Overviews the Internet’s evolution & introduces key security challenges within this history.

CYBER SECURITY

Investigates how cyber security is achieved within a mutating political & technical environment.

EVOLUTION OF THE HACKER

Charts the genesis of hackers, from their mid-twentieth century origins to present incarnations.

ANATOMY OF HACKING

Dissects how attackers breach networks & achieve their objectives (e.g. disruption, data theft).

DARK WEB

Explores the Dark Web’s mechanics, and how the cyber underworld collaborates.

CYBERCRIME

Explores how criminals have migrated online to exploit societal digitisation.

RANSOMWARE

Studies the threat of extortion attacks disabling enterprises.

THE CRYPTO WARS (CYBER SURVEILLANCE)

Recounts the conflict between citizens & states concerning encryption access.

CYBER ESPIONAGE

Examines the revolutionary impact cyber is having on espionage.

CYBER WARFARE

Focuses on cyber-warfare, drawing extensively on the Russia-Ukraine conflict.

CYBER TERRORISM

Examines extremists use of digital technology before analysing how they utilise hacking.

SEDUCTION & SECRETS: EXTREMIST HONEY TRAPS & HACKING

Follows how extremists use complex social engineering to trick targets into downloading malware downloads

LETHAL CYBER TERRORISM

Assesses whether terrorists can damage property, or harm people, exclusively using cyber.

COUNTERING CYBER THREATS

Analyses how states counter cyber threats, from criminal prosecutions to hacking the hackers.

CYBER PROLIFERATION*

Surveys how cyber capabilities have spread to myriad countries.

ARTIFICIAL INTELLIGENCE & HACKING*

Charts artificial intelligence’s evolution, and its impact on cyber defence and offence.

ATTRIBUTING CYBER COVERT ACTIONS*

Explores the challenges of assigning cyber operations to their originators.

CRYPTO CURRENCIES*

Examines how crypto currencies can enable covert and illegal activities.

DISINFORMATION*

Analyses how information environments can be polluted to the advantage of a threat actor.


*Available Summer 2025

Mark O.

Head of Cyber Security

1 个月

Looks great Craig.

Professor Richard Benham FCIIS FBCS

Patron of The National Museum of Computing at Bletchley Park. World’s first Professor of Cyber Security Management and Independent Expert in Cyber Innovation, AI, Trust and Ethics. #1 Best Selling Author, BBC Panelist.

2 个月

Recommended

要查看或添加评论,请登录

Dr Craig Jarvis的更多文章

  • Cyberterrorism: Myth & Reality - Provisional Outline

    Cyberterrorism: Myth & Reality - Provisional Outline

    Very much a draft structure, but below is my working abstract and chapter outline for Cyberterrorism: Myth & Reality. I…

    2 条评论
  • Lethal Cyberterrorism: A Capability Acquisition Model

    Lethal Cyberterrorism: A Capability Acquisition Model

    In 1991, the US National Research Council concluded: ‘Tomorrow's terrorist may be able to do more damage with a…

    1 条评论
  • A Framework for Ending the Crypto Wars

    A Framework for Ending the Crypto Wars

    For almost six years my research focus has been to document the crypto wars, in order to provide a robust foundation…

    1 条评论
  • A New Crypto Wars Chronology (II)

    A New Crypto Wars Chronology (II)

    Earlier in the year I argued for a new chronology of the crypto wars, positing three, rather than two, conflicts had…

    3 条评论
  • The Cypherpunks - Digital Insurgents

    The Cypherpunks - Digital Insurgents

    The Cypherpunks were a remarkable group of cryptologists, technologists and digital rights activists operational…

    1 条评论
  • A New Crypto Wars Chronology (I)

    A New Crypto Wars Chronology (I)

    For half a decade I've been writing a book on the political history of digital encryption. In September I left my role…

    1 条评论