Cybersecurity College Credit

Cybersecurity professionals are essential as digital threats evolve in complexity and scale. Prepare for careers in this field while earning college credit from Georgetown University. This course examines cybersecurity's technical, ethical, and strategic dimensions through real-world analysis. You'll study how threat actors operate, evaluate vulnerabilities in technology and human behavior, and explore AI's dual role in security. Through case studies and a capstone project, you'll discover if this critical profession suits your analytical strengths.

Program Dates

Multi-length courses available throughout the year

Eligibility

For students ages 18 and up

College Credit Course Fees

$3,995

Enrichment Course Fees

$1,895

What's the Difference Between Our College Credit and Enrichment Courses?

Both enrichment and college credit–bearing options feature engaging online lessons and instructional support. College credit–bearing courses include additional coursework and offer the opportunity to earn academic credit upon successful completion. Some course content overlaps across both options, so students are encouraged to choose the format that best aligns with their academic or professional goals.

College Credit Courses
$3,995

Length of Course: Multi-length course options

Instruction & Activities: 128 hours

Grading: Letter grade

On Your Own Schedule: ✔️

Academic Support: ✔️

Final Project: ✔️

College Credit Hours: ✔️

Certificate of Completion: Georgetown Transcript

Enrichment Courses
$1,895

Length of Course: 1-, 2-, or 4-weeks

Instruction & Activities: 20-30 hours

Grading: Pass/Fail

On Your Own Schedule: ✔️

Academic Support: ✔️

Final Project: ✔️

College Credit Hours:

Certificate of Completion:✔️

The People, Technology, and Ethics of Cybersecurity

Building Cyberspace: Innovation and Consequences

Trace key technological, economic, and social milestones that shaped cyberspace's evolution over two decades. Research how companies balance profit motives against security imperatives by analyzing high-profile breaches and their consequences.

Threat Actors and Their Targets

Differentiate between nation-state and non-state actors while learning their motivations, methods, and target selection. Defend positions on hacktivism ethics and propose policy solutions to address state-sponsored cyber warfare globally.

Understanding What Makes Systems Vulnerable

Identify security flaws in digital technologies and risky behaviors that increase vulnerability to cyberattacks. Debate whether data monetization can coexist with user privacy by analyzing cases like Cambridge Analytica and proposing organizational safeguards.

Evaluating AI's Dual Role in Security

Distinguish between AI applications that detect threats and adversarial attacks that manipulate AI systems. Develop arguments about AI's net impact by analyzing deepfakes and defending positions on its role in cybersecurity.

Where Cybersecurity Is Heading Next

Examine cybersecurity challenges across cloud computing, IoT, quantum computing, smart cities, and space exploration. Assess how cyber warfare between nations threatens global security by analyzing real attacks and proposing preventive measures.

Your Path Into Cybersecurity

Apply threat analysis and defensive strategies by creating a comprehensive security plan for a ransomware scenario. Understand how these skills position you for roles in risk management, threat intelligence, security policy, penetration testing, and related fields.

What You Gain From This Experience

  • Experience analyzing real cyberattacks and cyber warfare to understand their impact on organizations and international security.
  • Perspective on career pathways in cybersecurity risk management, threat intelligence, policy, penetration testing, and defense operations.
  • Understanding of how cyberspace evolved and the ethical tensions between innovation, profitability, and security in digital technology.
  • Insight into threat actors from nation-states to hacktivists, including their motivations, methods, and what makes organizations vulnerable.
  • Knowledge of AI's dual role in cybersecurity, from strengthening defenses to enabling sophisticated attacks like deepfakes and malware.
  • The opportunity to earn official college credit from Georgetown University through graded coursework and a capstone project.

Female student taking an online course on her laptop

What Sets This Program Apart

A Capstone Project With Real-World Relevance

  • Take on the role of a cybersecurity consultant advising a school district following a ransomware attack.
  • Develop strategic recommendations covering threat prevention, penetration testing, ransom considerations, and implementation costs to protect against future incidents.

Instructional Guidance And Mentorship

  • Receive feedback from TAs as you analyze threats, evaluate vulnerabilities, and develop security recommendations.
  • Strengthen your ability to assess cybersecurity challenges and communicate strategic solutions with expert guidance throughout the course.

Flexible Learning With Clear Expectations

  • Engage with online coursework designed to fit around your current academic, professional, or personal schedule.
  • Complete assignments and the Final Capstone Project on a structured timeline that supports independent planning.

Apply Now for the Next Available Course

Course Designed by Georgetown University Faculty

Dr. Frederic Lemieux | Cybersecurity Instructor | Georgetown University

Dr. Frederic Lemieux, Ph.D.

Professor of the Practice and Faculty Director of the Master of Professional Studies in Cybersecurity Risk Management and Applied Intelligence programs

Dr. Frederic Lemieux is an innovative researcher and inspirational leader. He specializes in the field of global threats and homeland security. He earned a doctoral degree in criminology from the University of Montreal in 2002 at the age of 26. Dr. Lemieux has created and managed several cutting-edge academic programs in intelligence, policing, homeland security, and cybersecurity. Dr. Lemieux’s work has been published in numerous preeminent journals and books. He has presented research findings as a panelist and keynote speaker in national and international conferences.

Want to Know More?

Sign up for more information and we’ll be in touch.

Admissions

Our application process is easy. You can expect a prompt decision.

Start Application

Frequently Asked Questions

How will you be graded? What are assignments like? How much time do you have to turn around a project? When do you find out if you’re admitted? Find answers to your questions here.

Answers to Your Questions Here

Scholarships

We offer need-based scholarships for participating students who exhibit high potential and an inability to pay the full tuition. 

  • If you haven’t applied to the program, apply here. After submitting your application, click “Apply for a need-based scholarship” on the confirmation page to request a scholarship.  
  • If you’ve already applied to the program, sign in to your profile to check your scholarship status. If we don’t have a scholarship request on file, click “Apply for a need-based scholarship” to request a scholarship.