Tuesday, August 11, 2020

Studying Cybersecurity at SIPA A Course Guide COLUMBIA UNIVERSITY - SIPA Admissions Blog

Studying Cybersecurity at SIPA A Course Guide COLUMBIA UNIVERSITY - SIPA Admissions Blog Photo:  SIPA students and recent graduates traveled to Washington, D.C., to meet with senior industry professionals and SIPA alumni working in the field of cybersecurity and threat intelligence. Threats emanating from cyberspace impact governments, the private sector, non-profits, and individuals. The borderless nature of (most of) the internet as well as the fact that the private sector owns much of the infrastructure creates difficult policy challenges that governments and companies continue to confront. Thankfully, SIPA is helping train students to tackle these challenges through innovative coursework that allows students to explore the technical, legal, and policy aspects of cybersecurity. As a current student, I’ve taken several courses focused on this area, and I’ve found SIPA to be a great place to study cybersecurity policy. While I concentrate in International Security Policy, there are courses applicable to students in all concentrations. An International Finance and Economic Policy student might explore cyber risk to financial stability, for example, while an International Security Policy student may be more interested in cyber conflict. As you apply to SIPA and prepare your personal statement, use this guide to assist in your research and allow you to explore the potential paths you can take in this exciting field. Basic Technical Background (a great place to start!) Computing in Context  This course teaches the Python programming language through a series of lectures and labs taught by a computer science professor. Then, a SIPA professor explores how these skills can be applied to solving public policy problems. This is an extremely popular class at SIPA that provides a very marketable skill set. While I haven’t personally taken the course, I’ve spoken to several fellow students who found the course challenging but highly practical. Programming for Entrepreneurs  This hands-on short course, which requires no technical background, takes place over an intensive four days and covers the fundamentals of computer science, data structures, web development with HTML/CSS, as well as some basic SQL. While I had some basic web development experience from my undergraduate studies, this course still provided me with valuable skills and was a great first course to gain some additional technical background prior to taking other courses on this list. Basics of Cybersecurity  This course equips students with the basic technical knowledge needed to succeed in other cybersecurity courses at SIPA. Students learn the basics of how computers and the internet work, networking concepts, and network defense and security. When I took this course, it was taught by an active-duty U.S. Army cyber officer, and it was fascinating to learn these concepts directly from an experienced practitioner. Cyber Risks and Vulnerabilities  This course complements the Basics of Cybersecurity course by focusing on the risks and vulnerabilities of various devices and protocols. The course includes demonstrations of common hacking techniques or tools to illustrate how these vulnerabilities are exploited and the potential impact. You should aim to take this course after taking Basics of Cybersecurity. General Problems in Cyber Policy and Cyber Conflict Cybersecurity: Technology, Policy, and Law  This innovative seminar course brings together professors and students from SIPA, the Computer Science department, and the Law School to explore cybersecurity issues from the lenses of all three disciplines. The course culminates in an interdisciplinary research project. Students interested in any aspect of cybersecurity or the impact of technology on policy and law will benefit greatly from this course. Tip: if you’re interested in this course, demonstrate your interest in cybersecurity by taking other related courses and joining the student Digital and Cyber Group. The course always has a wait list and this will differentiate you. Dynamics of Cyber Conflict  This course focuses on the national security aspects of cybersecurity, specifically how cyber conflict has developed and how it differs from other types of conflict. Through an interactive exercise, students will learn how to formulate practical policy recommendations to respond to a cyber incident. Taught by Professor Jason Healey, the editor of the first history of cyber conflict, this course is always popular and comes highly recommended. Skills-Based Courses Introduction to Cyber Threat Intelligence  This course introduces students to the skills required to work as a cyber threat intelligence analyst in government or in the private sector. While not required, students will benefit from having some prior technical knowledge, either from another SIPA course or from work experience. Taught by Professor JD Work, who has extensive government and private sector experience, the course has numerous hands-on intelligence analysis exercises that provide valuable experience (and are fun!). Cybersecurity and Business Risk  This course examines cybersecurity from the perspective of the private sector. It explores the risks of conducting business connected to the Internet and how businesses understand and manage these risks. This course is especially beneficial to International Finance and Economic Policy students interested in cybersecurity. Taught by Professor Neal Pollard, the CISO of UBS, the course will help prepare you for cyber risk related roles in a wide variety of industries. SIPA is a leader in training the next generation of leaders in cybersecurity policy. I encourage you to explore these courses as you craft your personal statement. A personal statement that clearly demonstrates how SIPA will advance your career goals is a great way to stand out in the application process, and cybersecurity courses from SIPA are a great way to stand out in your future job hunt.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.