Course Schedule
Classes Found
Cybersecurity Risk Management
- WED 10:30 am – 12:10 pm TNH 3.126
Course Information
- Course ID:
- 196V
- Short course:
- 1/19/22 — 3/2/22
- Cross-listed with:
- Other school
Registration Information
- Upperclass-only elective
Description
Same as LAW 179P, Cybersecurity Risk Management.
This course will provide an overview of cyber risk management concepts and techniques, and then provide a tangible deep-dive into real-world examples and scenarios. This will be a collaborative and case-based class over the course of the semester. We will walk through a set of risk identification, risk assessment, and risk management for case studies. Discussions will include an overview of cyber risk management frameworks, relevant regulations, and available tools. We will cover the latest thinking in risk-based assessments, including reporting audit issues, and designing internal controls. We will then cover risk management with governance models including the three lines of defense, and risk management techniques.
Cybersecurity Risk Management
- WED 9:00 – 10:40 am ONLINE
Course Information
- Course ID:
- 179P
- Short course:
- 1/27/21 — 3/10/21
- Cross-listed with:
- Other school
Registration Information
- Upperclass-only elective
Description
This course will be taught entirely online via Zoom.
This course will provide an overview of cyber risk management concepts and techniques, and then provide a tangible deep-dive into real-world examples and scenarios. This will be a collaborative and case-based class over the course of the semester. We will walk through a set of risk identification, risk assessment, and risk management for case studies. Discussions will include an overview of cyber risk management frameworks, relevant regulations, and available tools. We will cover the latest thinking in risk-based assessments, including reporting audit issues, and designing internal controls. We will then cover risk management with governance models including the three lines of defense, and risk management techniques.
Cyberspace: Security, Conflict and Public Policy in the Digital Domain
- TUE, WED, THU 6:15 – 8:15 pm TNH 2.137
Course Information
- Course ID:
- 189T
- Short course:
- 4/4/23 — 4/13/23
- Cross-listed with:
- Other school
Registration Information
- Upperclass-only elective
- Will use floating mean GPA if applicable
Description
This course is a practical and practitioner’s introduction to cybersecurity and how Governments have tried to respond to cyber threats, risks and harms. It covers structural insecurities in the Internet, the main threat actors (both state and criminal), and the nature and method of harms in cyber space. It then covers how Governments have attempted, with varying success, to develop policies and frameworks to deal with emerging cyber threats. This covers both the domestic response: improving security of Government networks and regulating and/or incentivising the private sector, and the international response, covering attempts to develop strategies to deter and punish hostile state action as well as the pursuit of globally accepted norms. It is led by a former senior practitioner who set up and then led the National Cyber Security Centre in the United Kingdom.
Cyberspace: Security, Conflict and Public Policy in the Digital Domain
- TUE, WED, THU 6:15 – 8:15 pm TNH 2.137
Course Information
- Course ID:
- 189T
- Short course:
- 4/12/22 — 4/21/22
- Cross-listed with:
- Other school
Registration Information
- Upperclass-only elective
- Will use floating mean GPA if applicable
Description
This course is a practical and practitioner’s introduction to cybersecurity and how Governments have tried to respond to cyber threats, risks and harms. It covers structural insecurities in the Internet, the main threat actors (both state and criminal), and the nature and method of harms in cyber space. It then covers how Governments have attempted, with varying success, to develop policies and frameworks to deal with emerging cyber threats. This covers both the domestic response: improving security of Government networks and regulating and/or incentivising the private sector, and the international response, covering attempts to develop strategies to deter and punish hostile state action as well as the pursuit of globally accepted norms. It is led by a former senior practitioner who set up and then led the National Cyber Security Centre in the United Kingdom.
Developments in Federal Indian Law
- FRI 1:05 – 4:15 pm CCJ 3.306
- SAT 9:00 am – 12:00 pm CCJ 3.306
Course Information
- Course ID:
- 196V
- Short course:
- 1/13/25 — 3/8/25
Registration Information
- Upperclass-only elective
Description
Taught by Michael Urena. The class only meets in person on February 7-8 and March 7-8. There will be required readings prior to the first meeting date.
This course will consider recent developments in federal Indian law, including the U.S. Supreme Court’s decisions in Haaland v. Brackeen and McGirt v. Oklahoma, and the ongoing litigation in Apache Stronghold v. USA through the lens of selected treaties, Acts of Congress, and U.S. Supreme Court decisions from 1763 to the present.
Digital Forensics and Incident Response for Law and Policy Students
- R. Cunningham
- MON, WED 2:15 – 3:30 pm ONLINE
Course Information
- Course ID:
- 389T
Registration Information
- Upperclass-only elective
- Will use floating mean GPA if applicable
Description
This course will be taught entirely online via Zoom.
This course will introduce the technical aspects of computer network security and how organizations plan for and respond to cyberattacks. We will also discuss the basics of digital forensic technology. Though this course is intended to be a continuation of Technology of Cybersecurity, motivated students with even a rudimentary understanding of programming are welcome. The course is designed for graduate students in law, public affairs, and other non-technical disciplines. We will explore topics like denial of service attacks, intrusion detection, digital forensics, reverse engineering, mobile security, side-channel attacks, machine learning, VPNs, TOR, and The Dark Web.
Note that this course does not address legal or policy questions, as those are the subject of the separate Cybersecurity Foundations course taught by Professor Chesney. Both courses are part of the larger Strauss Center program promoting cross-disciplinary training related to cybersecurity across the graduate school community at UT.
Digital Forensics and Incident Response for Law and Policy Students
- R. Cunningham
- TUE, THU 4:30 – 5:51 pm ONLINE
Course Information
- Course ID:
- 379M
- Cross-listed with:
- Other school
Registration Information
- Upperclass-only elective
- Will use floating mean GPA if applicable
Description
This course will be taught entirely online via Zoom.
This course will introduce the technical aspects of computer network security and how organizations plan for and respond to cyberattacks. We will also discuss the basics of digital forensic technology. Though this course is intended to be a continuation of Technology of Cybersecurity, motivated students with even a rudimentary understanding of programming are welcome. The course is designed for graduate students in law, public affairs, and other non-technical disciplines. We will explore topics like denial of service attacks, intrusion detection, digital forensics, reverse engineering, mobile security, side-channel attacks, machine learning, VPNs, TOR, and The Dark Web.
Note that this course does not address legal or policy questions, as those are the subject of the separate Cybersecurity Foundations course taught by Professor Chesney. Both courses are part of the larger Strauss Center program promoting cross-disciplinary training related to cybersecurity across the graduate school community at UT.
Dignitary Torts
- TUE, THU 1:05 – 2:20 pm TNH 3.115
Course Information
- Course ID:
- 396W
Registration Information
- Upperclass-only elective
- Will use floating mean GPA if applicable
Description
The term “dignitary torts” is sometimes used to encompass defamation, invasion of privacy, and intentional infliction of emotional distress, and perhaps also certain instances of battery, assault, and false imprisonment. The label is meant to reflect that in these areas tort law protects not only against more concrete forms of injury and loss, but also against various infringements of individual dignity simply as such.
This course will be organized around two objectives. The first is to acquire a deeper understanding of the doctrinal structure and current state of development of the dignitary torts, with particular attention to defamation and invasion of privacy.
The second objective is to consider a puzzle posed by Kenneth Abraham and Edward White, who have observed: “The absence of a robustly-articulated conception of the interest in dignity that tort law protects is puzzling. Why have notions of dignity and dignitary torts been little more than labels, reflecting a value that has gone unanalyzed and undebated, despite its obvious and growing importance?” We will investigate the nature of the interest in dignity that tort law purportedly protects, and consider whether the concept of dignity is suited to serve as a point of reference for understanding the “dignitary torts” and guiding their future development.
Course Information
- Course ID:
- 197L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- 297L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- 397L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- W197L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- W297L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- W397L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- 197L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- 297L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- 397L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- 197L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- 297L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- 397L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- W197L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- W397L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- 197L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- 297L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA
Description
No description text available.Course Information
- Course ID:
- 397L
Registration Information
- Upperclass-only elective
- Will not use floating mean GPA