This course was both enjoyable and very, very pertinent to cybersecurity. I saw some other comments from students who said the course seemed to have very little with cybersecurity, but I know from experience this class was very good and should prove useful in the future for those students who plan to enlarge their career prospects.
I've already worked in infosec for many years, and most of that time was overseas. As a practitioner, I've had to work both with foreign governments on policy and with the nitty-gritty details of reading log files or coding a script to solve some issue.
If students think cybersecurity is just coding, then that's fine and you can work as a low-level analyst or network administrator. There's nothing wrong with that. But I've had to explain issues to visiting congressional delegations and to agencies of foreign governments in their own jargon and from their POV so they could understand the geopolitical ramifications. This is where this class comes in handy. It gives a VOCABULARY you can use and be aware of when -- at the managerial or executive level -- you need to frame a discussion in a certain way.
And even if you are a threat analyst, appreciating the historical and geopolitical intricacies of a situation can illuminate (possibly) some things for you with attribution.
Like many things in life, you get out of something what you put in. This class was a very welcome breath of fresh air and I can see wholeheartedly why it's part of the curriculum. If you cannot see how or why it's part of the course, then either trust me or drop the course.
There are lots of readings. You get out of them what you put in. I've actually connected with some of the authors (those who are alive, because some of the readings are quite old) via LinkedIn when I've cited them in my writings, and I've found it very valuable for networking and for enlarging my own knowledge.
As for the movies (someone commented on them previously), the movies are a great addition. They help focus on extracting meaning from another medium (besides the written word) and also to view issues surrounding war and peace from a cultural standpoint. Importantly, in at least the film I saw, even though the film was produced 58 years ago, it specifically focused on the same problems of deterrence we find with cyber -- how can deterrence take place when we want to keep our cyber strengths hidden from our enemy? This of course then impacts attribution and ways we struggle in cybersecurity with some of those issues. Again, you get out of it what you put in.
One interesting thing: I was chatting with a friend who runs a global research institute during the semester and I mentioned I was in the Masters program and he asked me if I had ever read XYZ author. I told him that there were a couple assigned readings by that XYZ author. He said they were about to hire XYZ author for their cybersecurity department. So, again, you get out of it what you put in. This was a serendipitous occurrence and shows the web of relationships emanating from this class.