Program overview

Are you interested in working in cybersecurity but unsure if it’s the right career choice for you?

This professional certificate program will introduce you to the field of cybersecurity, as you learn about its landscape, numerous sectors and various roles, competencies and career pathways.

You will learn about the role of the Chief Information Security Office (CISO) as you study the policies, procedures, practices and technologies put in place to mitigate organizational and systems vulnerabilities to cyberattack.

You will also learn about the type of skills needed from a cybersecurity professional, outside of technical proficiency. And lastly, you will be given the opportunity to complete a self-assessment to determine which career path in cybersecurity is right for you.

The goal of this program is to help you better understand cybersecurity and the opportunities within this field as they apply to you. The program is intended for learners who wish to identify their specific optimal niche and create a plan for entry into this exciting field.

What you will learn

  • Describe the vast array of roles and sectors within the Cybersecurity industry;
  • Explain the relationship between management and technology in cybersecurity protection;
  • Identify appropriate types of security controls to the actions of different and evolving threat actors;
  • Apply terminology and basic concepts of cybersecurity;
  • Assess own knowledge, skill, and abilities toward identifying a career path in cybersecurity.

Program Class List

1
Introduction to Cybersecurity

Course Details
An introduction to cybersecurity, ideal for learners who are curious about the world of Internet security and who want to be literate in the field.

2
Cybersecurity: The CISO's View

Course Details
Learn about cybersecurity operations and the role played by the Chief Information Security Officer (CISO) in the industry.

3
Building a Cybersecurity Toolkit

Course Details
Develop a set of skills and characteristics that expand beyond technical proficiency to become a successful cybersecurity professional.

4
Finding Your Cybersecurity Career Path

Course Details
Learn about different career pathways in cybersecurity and complete a self-assessment project to better understand the right path for you.

Meet Your Instructors

Barbara Endicott-Popovsky

Director, Center for Information Assurance and Cybersecurity at University of Washington
Barbara Endicott-Popovsky is the director of the Center for Information Assurance and Cybersecurity. She also teaches cybersecurity in several University of Washington programs. Endicott-Popovsky is a member of several national committees shaping cybersecurity education. She earned her doctoral degree from the Center for Secure and Dependable Systems in the Department of Computer Science at the University of Idaho.

David Aucsmith

Senior Principal Research Scientist, Applied Physics Lab at University of Washington
David Aucsmith is a Senior Principal Research Scientist - Applied Physics Lab at the University of Washington. He has worked in a variety of security technology areas including secure computer systems, secure communications systems, security architecture, random number generation, cryptography and cryptographic systems, steganography and network intrusion detection. Aucsmith is a former officer in the U.S. Navy and has written extensively on cybercrime, cyber espionage and cyber warfare. He has been a representative to numerous international, government and academic organizations including the National Academy advisory board on Survivability and Lethality Analysis and the Directorate Advisory Council for the National Security Directorate of Pacific Northwest National Labs. He is co-chairman of the FBI's Information Technology Study Group, a member of the President's Task Force on National Defense and Computer Technology and a member of the Department of Defense's Global Information Grid Senior Industry Review Group. Aucsmith was also U.S. industry representative to the G8 Committee on Organized, Transnational, and Technological Crime where he participated directly in the G8 summits in Paris, Berlin and Tokyo.