Cybersecurity College Credit

Step into the complex realm of cybersecurity and earn college credit. Investigate cyber threats, examine AI security protocols, and learn directly from FBI and CISA professionals. Chart the history of digital conflict, analyze data protection strategies, and explore the landscape of ethical hacking. Delve into real-world scenarios and map out the crucial career paths that secure our digital world. Your journey to safeguarding the future begins now.

Program Dates

Multi-length courses available throughout the year

Eligibility

For students ages 13 and up

College Credit Course Fees

$3,995

What's the Difference Between our College Credit and Enrichment Courses?

While both options include dynamic video lessons by renowned Georgetown faculty and access to support, the college credit courses contain additional coursework hours and allow you to earn college credit upon completion. We recommend selecting either the college credit or the enrichment option as some content overlaps between the two modalities.

Cybersecurity College Credit Course
$3,995

Length of Course: Multi-length course options

Instruction & Activities: 128 hours

Grading: Letter grade

On Your Own Schedule: ✔️

Academic Support: ✔️

Final Project: ✔️

College Credit Hours: ✔️

Certificate of Completion: Georgetown Transcript

Cybersecurity Enrichment Course
$1,795

Length of Course: 1-, 2, or 4-weeks

Instruction & Activities: 20-30 hours

Grading: Pass/Fail

On Your Own Schedule: ✔️

Academic Support: ✔️

Final Project: ✔️

College Credit Hours:

Certificate of Completion:✔️

Uncover the Strategies Behind the Future of Cybersecurity

Decode Cyberspace's Hidden Layers.

Unravel how tech, economics, and society mold cyberspace. Discover cybercriminal tactics, from crypto exploits to dark web dangers. Analyze ethical dilemmas balancing profit and security, and learn the impact of ignored cybersecurity.

Identify Cyberattackers and Their Tactics.

Explore diverse cyberattacks and their actors, distinguishing state and non-state threats. Analyze motivations, vulnerabilities, and hacktivism ethics. Examine infrastructure impacts using global cases like Stuxnet and Salt Typhoon.

Fortify Your Digital Footprint Against Hidden Threats.

Discover why rapid digital change breeds security flaws. Pinpoint online habits that invite cyberattacks and learn protective measures. Analyze data monetization's ethics, privacy breaches, and cases like Cambridge Analytica to sharpen critical thinking.

Decipher AI's Impact on Cybersecurity.

Define AI's cybersecurity role, revealing its power and pitfalls. Explore AI hacks, from deepfakes to chatbot manipulation, and the ethics of malicious AI. Investigate adversarial attacks and AI-enabled penetration testing, highlighting criminal exploitation.

Cybersecurity's New Frontiers and Evolving Threats.

Identify converging technologies and their evolving cybersecurity impacts. Discuss security challenges posed by emerging tech and risk management. Recognize how smart cities, space exploration, and cyberwar disrupt cybersecurity, amplifying cyberattack consequences.

Defend Schools Against Ransomware.

Analyze a simulated school ransomware attack, addressing escalation and encrypted data. Weigh legal, reputation, and ransom factors for stakeholder responses. Develop penetration tests, justify costs, and strategize real-time threat defense.

How You Will Benefit

  • Experience a college-level cybersecurity course while in high school.
  • Earn college credit from Georgetown University.
  • Study real cyberattacks, from state-sponsored threats to ransomware, and learn to build strong defenses.
  • Discuss the ethical problems in cybersecurity, like data profits, hacktivism, and AI in cyber warfare.
  • See how new technologies such as AI, IoT, and smart cities change cybersecurity work and risks.
  • Learn how different cyberattacks work and build skills to protect digital information.
  • Complete a Final Capstone Project to demonstrate what you’ve learned.

Student completing Georgetown's cybersecurity course

Three Learning Advantages Designed for You

Final Capstone Project

  • Investigate a simulated ransomware attack on a school system, examining the technical aspects and the broader consequences.
  • Formulate a plan that addresses reputational harm, legal implications, and the ethical considerations of ransom payments.
  • Create a video presentation for the school board, detailing your analysis, proposed solutions, and a justified budget.

TA Support

You’ll receive guidance from a TA who can support you and deepen your learning experience. You can expect:

  • Encouragement and direction on all assignments. 
  • Inspiration, motivation, and confidence to help you excel in your studies. 
  • Brainstorming and ideation to help you prepare for your Final Capstone Project.

Flexible Learning

  • 100% online learning that works with your schedule.
  • Flexible learning format through video lessons. Tune in anytime that works for you.
  • Approximately 128 hours of total instruction and coursework, including engaging multimedia, simulations, and curated assignments for which you will receive guidance and support from TAs.

Apply Now for the Next Available Course

Course Designed by Georgetown University Faculty

 Frederic Lemieux | Cybersecurity Course Instructor | Georgetown University

Dr. Frederic Lemieux, Ph.D.

Professor of the Practice and Faculty Director of the Master of Professional Studies in Cybersecurity Risk Management and Applied Intelligence programs

Dr. Frederic Lemieux is an innovative researcher and inspirational leader. He specializes in the field of global threats and homeland security. He earned a doctoral degree in criminology from the University of Montreal in 2002 at the age of 26. Dr. Lemieux has created and managed several cutting-edge academic programs in intelligence, policing, homeland security, and cybersecurity. Dr. Lemieux’s work has been published in numerous preeminent journals and books. He has presented research findings as a panelist and keynote speaker at national and international conferences.

How to Apply

It’s easy. No transcripts or letters of recommendation are required. Our application asks you to provide the following:

  • Basic contact information for you and your parent or guardian.
  • Why you wish to take this course, and a bit of your story, through writing, video, photos—any media you prefer.

Begin the guided process. It should take only a few minutes to answer the questions.

Begin the process

Student applying to Georgetown's online cybersecurity course

Want to Know More?

Sign up for more information and we’ll be in touch.

Admissions

Our application process is easy. You can expect a prompt decision.

Start Application

Frequently Asked Questions

How will you be graded? What are assignments like? How much time do you have to turn around a project? When do you find out if you’re admitted? Find answers to your questions here.

Answers to Your Questions Here

Scholarships

We offer need-based scholarships for participating students who exhibit high potential and an inability to pay the full tuition. 

  • If you haven’t applied to the program, apply here. After submitting your application, click “Apply for a need-based scholarship” on the confirmation page to request a scholarship.  
  • If you’ve already applied to the program, sign in to your profile to check your scholarship status. If we don’t have a scholarship request on file, click “Apply for a need-based scholarship” to request a scholarship.

The University reserves the right to modify the course as may become necessary.