Responding to Cyber Threats from Hackers and Extremists

Overview

This one-day course examines the rise in hacking, its connection with extremist activity, and the emerging threats they pose to organisations.
We begin by tracing the history of hacking, from its origins in the 1950s and the cypherpunk movement of the 1990s to today’s diverse hacker ecosystem.  You’ll explore how motivations, capabilities and tactics have shifted, and what this means for your organisation’s risk profile.
The course then investigates the use of cyber tools by extremist groups, with a focus on disinformation, espionage and sabotage.  You’ll learn how these actors operate and the risks they pose, enabling you to recognise threats and understand where organisations may be most vulnerable.
Finally, we explore social engineering threats, including ‘honey trap’ techniques that manipulate individuals into facilitating the compromise of their own digital devices and systems.  We will analyse how these schemes lead to the extraction of sensitive information, even when attackers lack advanced technical skills, and review countermeasures being adopted by potential targets. You’ll learn about defensive measures and risk reduction strategies that organisations can implement to protect their systems and staff.

By the end of the course, you’ll understand how hackers and extremists operate online and how organisations can assess, detect and mitigate these risks.

Programme details

Sessions 1 & 2: Hackers

This session charts the evolution of hackers, from their start in the mid-twentieth century origins to the present day. Our exploration starts in the 1950s at MIT where the earliest hackers originated, we follow the movement through 1970s phone-phreakers, 1990s cypherpunks, and hacktivists who emerged around the year 2000. Finally, we explore the diverse community of hackers today.

Session 3: Cyber Terrorism

This session looks at how hacking has introduced new opportunities within fields such as disinformation, espionage and sabotage. We explore how extremists are operating with these new capabilities, and whether their actions represent a threat to organisations. 

Session 4: Seduction & Secrets: Extremist Honey Traps & Hacking

This session explores how extremists use manipulation techniques (known as social engineering) to trick targets into downloading malware. We will study how extremists, who typically operate with fewer technical skills than organised crime groups and nation-state threat actors, rely on manipulation to breach the devices of their targets. We will examine how extremists create online honey traps, by posing as attractive young men or women, and approaching their targets via social media with the pretence of a romantic relationship. You will learn how this leads to the theft of sensitive information, and the countermeasures used to protect against these attacks. 

This course can be taken separately or as part of our Cyber Security for Business Discount Week (29 June - 3 July 2026).

Attending Your Course 

Further details will be emailed to you two weeks ahead of your course, this will include registration information and an overview of the course timetable.

Please get in touch if you have not received this information within five working days of the course start date. 

In the meantime, you may wish to plan your travel: Travel information

Certification

In order to be eligible for a certificate of attendance, you will need to attend the whole course. Participants who meet this criterion will be emailed after the end of the course with a link, and instructions on how to access their University of Oxford digital certificate. 

The certificate will show your name, the course title and the dates of the course you attended. You will be able to download your certificate, as well as share it on social media if you choose to do so. 

Fees

Description Costs
Standard course fee £745.00

Payment

Fees include course materials, tuition, refreshments and lunches. The price does not include accommodation.

All courses are VAT exempt.

Register immediately online 

Click the 'Book now' button on this webpage. Payment by credit or debit card is required.

Request an invoice

If you require an invoice for your company or organisation, please email us to request an online application form.  

Payment is then accepted online, by credit/debit card, or by bank transfer. 

Tutor

Dr Craig Jarvis

Dr Craig Jarvis is a recognised industry leader and academic in cybersecurity, with a distinguished career spanning technical, strategic and executive leadership roles.

He brings substantial industry experience, most notably serving as Chief Technology Officer at DXC Security - then the world’s largest provider of security services. In this role, he was joint second-in-command of a $1 billion annual revenue business comprising over 4,000 cybersecurity professionals and 16 security operations centres. His responsibilities encompassed enterprise leadership, technology strategy, and portfolio development.

During his tenure, Craig founded DXC Security Labs, leading innovation in cybersecurity research and development. He also established a strategic cyber threat intelligence function and launched a cyber-physical systems security division, which generated a $50 million sales pipeline within its first year.

Craig has worked across all major industry sectors. His engagements have included advising energy companies during nation-state breach responses, enhancing hospital resilience strategies, and supporting government agencies with cybersecurity transformation. Most of his time is now spent in financial services, where he advises major banks and private equity firms on cybersecurity strategy, architecture, and due diligence.

A long-standing expert in security operations, Craig spent many years in his early career as a forensic and threat intelligence analyst, leading breach investigations and countering advanced threat actors. He engineered systems to monitor malicious actors within compromised systems. 

In addition to his industry contributions, Craig is a researcher and academic. He lectures at leading institutions including the University of Oxford, University of Cambridge, Imperial College London, and Royal Holloway. He has delivered training to business executives and technical leaders from some of the world’s most prestigious organisations.

Craig holds a PhD in cybersecurity, as well as master’s degrees in international security, information security and digital forensics, and classical music. He studied at institutions including the University of Oxford, King’s College London, and Royal Holloway.

His forthcoming book, Cyber Terrorism: Extremism & Hacking, will be published in 2026. He is the author of CryptoWars: The Fight for Privacy in the Digital Age and has contributed to Next Generation Enterprise Security. His academic research has been published in respected peer-reviewed journals, including Intelligence and National Security.

As a member of the Offensive Cyber Working Group's College of Experts, Craig plays an active role in shaping research in offensive cybersecurity. He is also the founding chair of the Geopolitics-Cyber Community of London Experts (GeoCyclone), an organisation bringing together business leaders, academics, and policy makers to share knowledge on national security and digital technologies.

Craig is active on LinkedIn, often posting details of upcoming courses and ongoing research.

Application

If you would like to discuss your application or any part of the application process before applying, please click 'Ask a Question' at the top of this page. 

Accommodation

Although not included in the course fee, accommodation may be available at our on-site Rewley House Residential Centre. All bedrooms are en suite and decorated to a high standard, and come with tea- and coffee-making facilities, free Wi-Fi access and Freeview TV. Guests can take advantage of the excellent dining facilities and common room bar, where they may relax and network with others on the programme.

To check prices, availability and to book rooms please visit the Rewley House Residential Centre website. 

Enrolled students are entitled to discounted accommodation rates for the purpose of study, at Rewley House, and can contact the administration team for the promotional code to use for making online accommodation bookings via the website.