Daily schedule
Seminars meet each weekday morning after breakfast.
After lunch, afternoons are free for individual study or exploring the many places of interest in and around the city. Optional plenary excursions and social activities including walking tours will also be available.
The course fee includes breakfasts Monday-Saturday (residential guests only), lunches Sunday-Friday, and three-course dinners Sunday-Thursday. All meals are taken in Christ Church’s spectacular dining hall.
On Friday, there will be a special four-course gala dinner to celebrate the closing of the week.
Seminars
Monday
Security in the Digital Age
This lecture provides an overview of the Internet’s evolution and introduces key national security challenges. We will examine how digital technologies have impacted crime, espionage, sabotage, subversion, surveillance, and terrorism, before turning our attention to future challenges. At the end of this lecture, you will have a panoramic view of how the digital age has impacted national security establishing a strong foundation for future study.
Tuesday
Cyber Security: Defending the Kingdom
This lecture investigates how cyber security is pursued within a mutating political and technical environment. We will examine the primary challenges to managing cyber security, firstly we will survey the threat landscape before continuing to study some of the attack methodologies malicious actors use. Finally, we will consider how individuals, businesses, and nation-states can protect themselves.
Wednesday
Cyber Espionage: Revolution or Evolution?
This lecture examines the substantial impact hacking techniques are having on espionage. We start by exploring the new capabilities delivered by the digital revolution, before considering how traditional intelligence practices and cyber tradecraft interact. Then, we analyse the different use cases of cyber espionage, from gaining insight into foreign rivals to stealing an enemies' war plans. At the conclusion of this lecture students will have a strong foundational understanding of how cyber-espionage operates, and how it integrates into the wider portfolio of nation-state intelligence capabilities.
Thursday
Cyber Terrorism: A New Era of Extremism
This lecture first considers how online methods have enabled extremists to conduct traditional activities such as recruitment, financing, communications, open-source intelligence and propaganda at new scales. Then, we focus on how hacking has introduced new opportunities within fields such as disinformation, espionage, and sabotage.
Friday
Cyber Warfare: The Future of Combat?
This lecture first considers the history of cyber warfare, stretching back to the first Gulf War when US special forces considered using cyber sabotage to disable Iraqi air defences. We then study cyber warfare using three pillars: influence, espionage, sabotage. We consider how these pillars are employed before war, when they can contribute to pre-conflict advantage, and during the war, when they may aid conventional operations in numerous ways.