244 search results for “cyber norma” in the Public website
-
Freedom AND Security - Conference Report Published by Europol
On 22 November 2018, Els De Busser spoke at a panel during the conference
-
Gender equality, cybersecurity, and security sector governance
In this article, James Shires and Tatiana Tropina, assistant professors at the Institute of Security and Global Affairs, map the relationship between gender equality and cybersecurity governance as a component of good security sector governance (SSG). Here, it highlights the way in which cybersecurity…
-
ECSL Summer Course on Space, Cyber and Telecommunications Law
One of ECSL’s most successful activities is the ECSL Summer Course on Space Law and Policy, which is open to students of all levels of study, as well as a few young professionals already working in the space or space-related sectors. The course is now in its 31st year and boasts a large family of alumni…
-
The Hague Program for Cyber Norms successfully concludes their UN GGE norms commentary project
The Leiden University’s Program for Cyber Norms, a research platform to investigate the development and implementation of law and policy applicable to uses of ICTs, in cooperation with the think-tank ICT4Peace conducted a global open consultation on how to implement the UN Group of Governmental Experts’…
-
Open Call: Creation of Two SPOCs (Small Private Online Course) for Cyber Specialization
For the cyber specialization within the master program Crisis and Security Management, the Institute of Security and Global Affairs (ISGA) seeks to provide two online courses (SPOCs) to ensure that all students will be on the same page when it comes to prior knowledge of the technicalities of cyber…
-
'Terrorism and cyber criminality call for better international cooperation'
The United States and the European Union need to work together more closely in the field of the law to fight terrorists and criminals who are operating increasingly internationally. This was the advice given by American Minister of Justice Loretta Lynch during her visit to Leiden University on 1 Jun…
-
From cyber to Syria: the many aspects of security
During the final session of the PRE-University Class Security Challenges in the 21st Century, students showcased their thorough analysis of contemporary safety and security challenges. The results were impressive, according to both the teachers and the assessors: ‘You almost forget that they’re high…
-
Marco Romagna
Faculty Governance and Global Affairs
-
Unmasking the Term 'Dual Use' in EU Spyware Export Control
This article illustrates how the term 'dual use' has become associated with a broader dichotomy between ‘legitimate’ and ‘illegitimate’ purposes.
-
Olga Gadyatskaya
Science
-
Introductie webinar cyber security
Study information
-
Online webinar cyber security
Study information
-
Introductie webinar cyber security
Study information
-
Introductie webinar cyber security
Study information
-
Programme structure
The programme consists of four phases: conceptualisation, specialisation, electives and thesis.
-
Career prospects & Testimonials
The programme is aimed at professionals with a relevant master’s degree from a university (of applied sciences) and several years of professional experience who wish to broaden or deepen their knowledge of cyber security
-
Vulnerabilities and Cyberspace: A New Kind of Crises
In this study, Bibi van den Berg and Sanneke Kuipers from ISGA, explore the ways in which cyber-related incidents may lead to crises
-
Henning Lahmann
Faculteit Rechtsgeleerdheid
-
Contact
Still have questions about the Cyber Security programme? Please contact us!
-
Staff
The Cyber Security lecturers are scholars and lecturers of Leiden University, Delft University of Technology and The Hague University of Applied Sciences.
-
Systems and security
Researchers at LIACS are working to devise the computers of tomorrow that will be the backbone of the Cloud and Edge computing paradigms as well as the Internet of Things. In this respect, we are involved in research and development of high performance computing systems, embedded & real-time computing…
-
Three tales of attribution in cyberspace. Criminal law, international law and policy debates
In this policy brief, Dennis Broeders, Els De Busser and Patryk Pawlak discuss attribution of in cyberspace from three different perspectives: criminal law, international law and policy. Published together with EU Cyber Direct.
-
For professionals
The faculty offers several options to deepen and develop your knowledge while being employed. Within the faculty's themes, or in your own working field as a dual PhD candidate, you will be guided to make a next step in your career.
-
Responsible Behaviour in Cyberspace: Global narratives and practice
This edited volume draws from papers presented at the conference Closing the Gap | Responsibility in Cyberspace: Narratives and Practice, organized in June 2022 at the Egmont Palace in Brussels, Belgium, by Leiden University, as part of the EU Cyber Direct project.
-
Cyberweek
Did you know that research and education in the field of digital innovation are key pillars of the Faculty of Governance and Global Affairs? Over the next seven days, we are organising Cyberweek on our social media channels to showcase what we have to offer.
-
Cyberweek
Did you know that research and education in the field of digital innovation are key pillars of the Faculty of Governance and Global Affairs? Over the next seven days, we are organising Cyberweek on our social media channels to showcase what we have to offer.
-
Systems and Security
Researchers at LIACS are working to devise the computers of tomorrow that will be the backbone of the Cloud and Edge computing paradigms as well as the Internet of Things. In this respect, we are involved in research and development of high performance computing systems, embedded & real-time computing…
-
Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks
This new article by Monica Kaminska is part of a special issue for Journal of Cybersecurity, based on a selection of contributions from THe Hague Program for Cyber Norms' 2019 Conference.
- About this minor
- Tuition Fees
-
Admission requirements
To be eligible for the executive master’s programme in Cyber Security at Leiden University, you must meet the following admission requirements..
-
Modular learning: Enrolling in a single course
Do you want to be part of this unique programme, discuss cutting-edge topics of cyber security with other professionals, but do you not have time to enroll in this full master programme?
-
About the programme
The academic executive master’s programme Cyber Security is multidisciplinary; the programme covers technological as well as legal, administrative, economic and psychological aspects of digital security.
-
Why Leiden University?
The executive master’s programme in Cyber Security is unique in its integral approach and its professional ties and focus.
-
Governing Cyberspace: Behavior, Power and Diplomacy
Governing Cyberspace: Behavior, Power and Diplomacy is based on a selection of papers presented during The Hague Program for Cyber Norms' inaugural conference Novel Horizons: Responsible Behaviour in Cyberspace from 5-7 November 2018 in The Hague. The volume is edited by Dennis Broeders and Bibi van…
-
Education
The Institute of Security and Global Affairs (ISGA) offers courses at both bachelor’s and master’s level. There are also minors, online learning and courses for professionals.
-
Kompetisi Kreasi Video
Berhadiah tunai senilai total 1.000 Euro (seribu euro) untuk 3 video terbaik dan 2 karya favorit.
-
Admission and Application
Find out how to apply for Cyber Security at Leiden University by following our step-by step guide.
-
Healthcare robots and AI
Healthcare robots and AI is a project that investigates the legal and regulatory aspects of healthcare robot and Artificial Intelligence (AI) technologies
-
Cyber-Security-by-Integrated-Design (C-SIDe) project
Cyber-attacks, privacy-related problems or failures in functioning: many technologies that are used every day have security issues that are solved when the software is already in use. An interdisciplinary project, in which Olga Gadyatskaya, Harry Wijshoff, Alex Uta and Kristian Rietveld from the Leiden…
-
A coalition of the unwilling? Chinese and Russian perspectives on cyberspace
The Hague Program for Cyber Norms, a research program at the Institute of Security and Global Affairs, published its second policy brief, in which Dennis Broeders, Liisi Adamson and Rogier Creemers explore aspects of the relationship between China and Russia in cyberspace.
-
International Law and Cybersecurity Governance
This edited publication aims at reflecting on the future of discussions on the applicability of international law to States’ use of ICTs in the context of highly politicised discussions at the multilateral level and offering practical suggestions for the European Union to pursue its objectives in this…
-
Non-examination courses
As a non-examination student of MSc Cyber Security you can join our introductory courses without taking part in the course assignments and without taking the exam. At the end you receive a participation certificate, which does not contain any study results (as no exam was taken).
-
Leiden Embedded & Real-time Computing (LERC)
Leiden Embedded & Real-time Computing (LERC) is an expert lab and leader in advanced research on embedded and real-time systems and software. The main mission of LERC is by its research to contribute in a highly innovative way to the system-level design of embedded and cyber-physical systems and software…
-
Universiteit Leiden Academy
Education for professionals. Leiden University offers a wide range of courses to boost your career, learn new skills, or broaden your knowledge.
-
Bart Custers
Faculteit Rechtsgeleerdheid
- Contact
-
Security and threat
Polarisation in our society is on the rise. What makes people increasingly radical? How do we protect ourselves from extremist, terrorist or criminal threats, be they physical or in the cyber world? And what role do intelligence services play in this?
-
Open Consultation on UN GGE 2015 Norm Proposals
The Leiden University’s Program for Cyber Norms, a research platform to investigate the development and implementation of law and policy applicable to uses of ICTs, in cooperation with the think-tank ICT4Peace conducted a global open consultation on how to implement the UN Group of Governmental Experts’…
-
Introductie webinar cyber security
Study information