{"id":522,"date":"2025-12-10T12:56:04","date_gmt":"2025-12-10T12:56:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/georgesmith\/?page_id=522"},"modified":"2025-12-10T13:52:32","modified_gmt":"2025-12-10T13:52:32","slug":"cyse-425w","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/georgesmith\/cyse-425w\/","title":{"rendered":"CYSE 425W"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Course Description:<\/strong><\/h2>\n\n\n\n<p>This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity policies, businesses, and governmental institutions; the knowledge, skills, and abilities needed to develop and implement cybersecurity policy; the social, political, and ethical implications that arise in cybersecurity policies and strategies; strategies to assess cybersecurity policy; and the ties between national security and cybersecurity policy.<\/p>\n\n\n\n<p><strong>Course Objectives:<\/strong><\/p>\n\n\n\n<p>By the end of the course, the students will be able to:<\/p>\n\n\n\n<ul>\n<li>Describe the goal and structure of a national security strategy and compare it to cybersecurity strategy.<\/li>\n\n\n\n<li>Critically communicate the political and social implications that arise with cybersecurity policies and strategies.<\/li>\n\n\n\n<li>Compare and interpret cybersecurity policy issues and make recommendations on policy choices.<\/li>\n\n\n\n<li>Identify international cyber crisis management and conflict resolution mechanisms.<\/li>\n\n\n\n<li>Debate ethical issues that arise with cybersecurity policies<\/li>\n\n\n\n<li>Identify possible developments in cybersecurity strategy and policy.<\/li>\n\n\n\n<li>Assess cybersecurity strategy and policy<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Course Description: This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/georgesmith\/cyse-425w\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30474,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages\/522"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/users\/30474"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/comments?post=522"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages\/522\/revisions"}],"predecessor-version":[{"id":563,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages\/522\/revisions\/563"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/media?parent=522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}