Cybersecurity: Protecting Our Digital Future
Curious whether a career in cybersecurity is right for you? This field sits at the intersection of technology, policy, and human behavior, and demand for professionals continues to outpace supply. In this course, you'll examine how cyberspace evolved, how criminals and state actors exploit its vulnerabilities, and how AI is reshaping both offense and defense. With insights from industry experts at agencies like the FBI and CISA, you'll build a practical understanding of the threat landscape while evaluating whether your skills and goals align with this fast-growing profession.
Program Dates
Multi-length courses available throughout the year
Eligibility
For students ages 18 and up
College Credit Course Fees
$3,995
Enrichment Course Fees
$1,895
What's the Difference Between Our College Credit and Enrichment Courses?
Both enrichment and college credit–bearing options feature engaging online lessons and instructional support. College credit–bearing courses include additional coursework and offer the opportunity to earn academic credit upon successful completion. Some course content overlaps across both options, so students are encouraged to choose the format that best aligns with their academic or professional goals.
College Credit Courses$3,995
Length of Course: Multi-length course options
Instruction & Activities: 128 hours
Grading: Letter grade
On Your Own Schedule: ✔️
Academic Support: ✔️
Final Project: ✔️
College Credit Hours: ✔️
Certificate of Completion: Georgetown Transcript
Enrichment Courses$1,895
Length of Course: 1-, 2-, or 4-weeks
Instruction & Activities: 20-30 hours
Grading: Pass/Fail
On Your Own Schedule: ✔️
Academic Support: ✔️
Final Project: ✔️
College Credit Hours:❌
Certificate of Completion:✔️
Understand the Threats Shaping Cybersecurity and the Careers Behind It
How Cyberspace Became a Battleground
Trace the evolution of cyberspace from early connectivity to the rise of the e-economy, cybercrime, and the dark web. You'll also confront the ethical tension between commercial innovation and the cost of securing digital technology.
Who's Attacking, Why, and How
Examine the motivations, methods, and targets of cybercriminals, hacktivists, and state-sponsored actors, and learn how agencies like the FBI and CISA work to counter them. This module also challenges you to consider the blurred line between "good" and "bad" actors in cyberspace.
Vulnerabilities in Technology and Human Behavior
Identify the design flaws embedded in rapidly adopted technologies and the everyday behaviors that put individuals and organizations at risk. You'll assess practical protective measures alongside the ethical questions surrounding data privacy and monetization on social media.
AI in Cybersecurity, for Better and for Worse
Explore how artificial intelligence is being used to strengthen cybersecurity defenses while also creating new attack vectors like adversarial AI, smart malware, and deepfakes. This module grounds you in one of the most consequential debates shaping the profession today.
Emerging Threats on the Horizon
Survey current and future cybersecurity challenges across cloud computing, IoT, quantum computing, smart cities, and even outer space. You'll also examine the skills, certifications, and disciplines shaping a profession where demand continues to outpace the workforce.
Building a Career in Cybersecurity
Explore the skills, certifications, and educational paths that lead to roles in cybersecurity, from risk management and threat intelligence to policy and operations. Assess how the knowledge you've gained in this course maps to a fast-growing, high-demand profession.
What You Gain From This Experience
- Exposure to career paths in cybersecurity risk management, threat intelligence, policy, operations, and more.
- A clear picture of how cyberspace evolved, the threat actors exploiting it, and the human and technological vulnerabilities that organizations face today.
- Insight into how artificial intelligence is reshaping cybersecurity on both sides, from strengthening defenses to enabling more sophisticated attacks.
- Experience developing a strategic cybersecurity recommendation through a Final Capstone Project.
- A Certificate of Completion from Georgetown University upon successful completion of the course.

What Sets This Program Apart
A Capstone Project With Real-World Relevance
- Take on the role of a cybersecurity expert advising a recently hacked school district and develop a presentation with strategic recommendations for protecting against future threats.
- Practice the kind of threat assessment and stakeholder communication that cybersecurity professionals deliver in the field.
Instructional Guidance And Mentorship
- Receive feedback from course mentors as you analyze threats, develop your arguments, and prepare your Final Capstone Project.
- Build confidence in communicating complex cybersecurity concepts through guided review of written and presentation-based work.
Flexible Learning With Clear Expectations
- Engage with online coursework designed to fit around your current academic, professional, or personal schedule.
- Complete assignments and the Final Capstone Project on a predictable timeline that supports independent planning.
Apply Now for the Next Available Course
Course Designed by Georgetown University Faculty

Dr. Frederic Lemieux, Ph.D.
Professor of the Practice and Faculty Director of the Master of Professional Studies in Cybersecurity Risk Management and Applied Intelligence programs
Dr. Frederic Lemieux is an innovative researcher and inspirational leader. He specializes in the field of global threats and homeland security. He earned a doctoral degree in criminology from the University of Montreal in 2002 at the age of 26. Dr. Lemieux has created and managed several cutting-edge academic programs in intelligence, policing, homeland security, and cybersecurity. Dr. Lemieux’s work has been published in numerous preeminent journals and books. He has presented research findings as a panelist and keynote speaker in national and international conferences.
Want to Know More?
Sign up for more information and we’ll be in touch.
Frequently Asked Questions
How will you be graded? What are assignments like? How much time do you have to turn around a project? When do you find out if you’re admitted? Find answers to your questions here.
Answers to Your Questions HereScholarships
We offer need-based scholarships for participating students who exhibit high potential and an inability to pay the full tuition.
- If you haven’t applied to the program, apply here. After submitting your application, click “Apply for a need-based scholarship” on the confirmation page to request a scholarship.
- If you’ve already applied to the program, sign in to your profile to check your scholarship status. If we don’t have a scholarship request on file, click “Apply for a need-based scholarship” to request a scholarship.
