Explore the impact and ethics of using drones, special ops units and private security firms, with this free online course.
States are increasingly using remote control methods, such as drones, private military companies and special operations units, to engage in activities that were traditionally performed by their conventional armed forces.
The killing of Osama bin Laden in Pakistan by US Special Forces; the drone strike on Anwar al-Awlaki in Yemen; and the engagement of Academi (formerly Blackwater and Xe Services) in Iraq are just a few examples.
Understand the philosophical, ethical and cultural impact
This free online course looks at the reasons for this trend, including technological innovation; security privatisation; risk aversion among politicians and the public; and the opportunity that remote methods provide to circumvent the law.
Over six weeks, we’ll examine the philosophical, ethical and cultural challenges raised by remote control warfare, drawing on cases in Pakistan, Yemen, Libya and Iraq, and discuss how states like the UK, US and China oversee these methods.
Join the debate on remote control warfare
We’ll ask how our traditional understanding of war and security is changing, and how states in the future will ensure our security through non-traditional means. We’ll also look at the responsibilities states have for their own populations, as well as the wider international society.
Crucially, we’ll examine how remote control warfare is seen by those at its receiving end. Join us, as we ask:
- Does remote control warfare make states more prone to waging war?
- Does this recent trend influence the way states’ security activities are policed?
- Are drones an ignoble form of warfare, with a huge mismatch between the technological capabilities of each side?
- Do private military companies allow states to undertake new, illegal and unethical activities?
- Are special ops forces the optimum response to the public’s aversion to fear?
For IT professionals looking to enhance their security skills in areas such as enterprise security, risk management, integrating computing and research and analysis, CASP training is ideal. The CASP certification validates one’s knowledge of advanced security concepts and proves that an individual is capable of the critical thinking necessary to develop effective solutions. In our free online CompTIA CASP training, you’ll learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.
This course gives an introduction into the field of terrorism & counterterrorism studies. It will help you to analyze and understand these complex phenomena and discuss its impact on society with a global audience. Students, policy makers, journalists or anyone with a strong interest in understanding issues like the history, origins and nature of terrorism, security, fear management, resilience, politics, violence, foreign fighters and radicalization will find the course most relevant.
This course uses the lives, ideals and achievements of Theodore, Franklin, and Eleanor Roosevelt to create the idea of a Rooseveltian century. It is about doing research, analyzing primary sources, and connecting all this information with a coherent and logical interpretation. It is an invitation to think critically and historically, and it wants to give you a glimpse of what it means to be a historian at work.
In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
CISSP is the basis of advanced information assurance knowledge for IT professionals. Often referred to as the “gold standard” of security certifications, CISSP is one of the most important distinctions an IT professional can have on their resume. And it’s for good reason too: a CISSP certification verifies one has mastery of a multitude of information assurance and cyber security topics, something that’s necessary for IT management and leadership (a job that many CISSP holders fulfill). Our free online CISSP training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.
You will learn to extend your knowledge of making iOS apps so that they can securely interact with web services and receive push notifications. You'll learn how to store data securely on a device using Core Data. You’ll also learn to securely deploy apps to the App Store and beta users over-the-air.
This course bring together all the essential ingredients to build a secure WordPress website. This course teaches you various tips and tricks which ensures that you website and your business is protected from malicious hackers. The course presents the contents in a easy to understand way and does not assume any technical knowledge. This quick course will help you secure your website assets and will update with the latest tactics and strategies for WordPress Security. This is a free course with a MOOC List coupon.
What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.