Cybersecurity: Protecting Our Digital Future
Have you or anyone you know ever experienced a cyberattack? Do you love solving complex issues? Cybersecurity is a fast-paced, exciting field that shows no signs of slowing. This course unveils how cyberspace evolved, how it opened the door for cyberattacks, and how the world of the dark web came to exist. Learn from industry experts from the FBI, CISA, and more about the vulnerabilities that exist on the web, how they’re being exploited, and how cybersecurity experts are unraveling them. See how innovations in AI are affecting cybersecurity and find out what the future entails for this field.
Program Dates
Choose the course length that works for you: 1-week intensives, 2-week sessions, and 4-week sessions
Eligibility
For students ages 13 and up
Fees
$1,795
Step into the World of Cybersecurity
Learn How Cyberspace Evolved.
Study the history of cyberspace, eCommerce’s boom, and how the growing e-economy led to increased hacking. Explore ethical dilemmas like the struggle between profitability and enforcing security.
Identify Types of Attacks, Plus the “Who’s” and “Why’s” of Hacking.
Explore cybercriminals, their motivations, and targets. Learn why there’s a blurred line between “good” and “bad” actors. Study attack types and targets, threat actors, and counter-attack measures.
Dig into the Most Common Attack Vectors.
Learn how rapid digital transformation led to technology with embedded design flaws. Discover how certain behaviors put people at cyberattack risk and how to protect yourself online.
Cybersecurity and AI: The Good, the Bad, and the Ugly.
Define artificial intelligence and its role in cybersecurity. Discover different types of AI hacks, how criminals exploit AI, and the ethics surrounding using malicious AI.
Decide if Cybersecurity Is a Good Fit for You.
Examine the skills required to achieve professional certifications in cybersecurity, the various disciplines in the field, and the role diversity plays in this popular, emerging job market.
Explore College Majors and Future Careers in Cybersecurity.
Topics covered in this course offer a good background for potential college majors and career paths related to IT, systems engineering, the government, cyber threats, and more.
How You Will Benefit
- Understand how the evolution of cyberspace has created new opportunities for criminals and cybersecurity professionals.
- Have the ability to define the motivations, methods, capabilities, and targets used by cybercriminals.
- Be able to identify the main factors responsible for human and technological vulnerabilities.
- Discover the scope of the cybersecurity profession and upcoming trends.
- Examine and discuss diverse ethical and moral dilemmas in cybersecurity.
- Complete a Final Capstone Project to demonstrate what you’ve learned.
- Earn a Certificate of Completion from Georgetown University.
Three Learning Advantages Designed for You
Final Capstone Project
This online course culminates in a Final Capstone Project that allows you to choose from two project options.
Option 1:
- Your friend’s computer got hacked. Assess the methods used by the ransomware criminal. Create a simulated text or email thread between the friends.
Option 2:
- Create a presentation/poster using infographics that explain the common cybersecurity attacks encountered by teens.
Mentoring
You’ll receive guidance from a mentor who can support you and answer questions as you deepen your learning experience. You can expect:
- Encouragement and direction on all assignments.
- Inspiration, motivation and confidence to help you succeed.
- Brainstorming and ideation help as you prepare for your Final Capstone Project.
Flexible Learning
- 100% online learning that works with your schedule.
- Flexible format: you’ll learn through video lectures. Tune in anytime that works for you.
- 20 to 30 hours of total instruction and course work, including engaging multimedia, simulations, and curated assignments for which you will receive guidance and support from mentors.
Apply Now for the Next Available Course
Hear from Georgetown University
Course Designed by Georgetown University Faculty
Dr. Frederic Lemieux, Ph.D.
Professor of the Practice and Faculty Director of the Master of Professional Studies in Cybersecurity Risk Management and Applied Intelligence programs
Dr. Frederic Lemieux is an innovative researcher and inspirational leader. He specializes in the field of global threats and homeland security. He earned a doctoral degree in criminology from the University of Montreal in 2002 at the age of 26. Dr. Lemieux has created and managed several cutting-edge academic programs in intelligence, policing, homeland security, and cybersecurity. Dr. Lemieux’s work has been published in numerous preeminent journals and books. He has presented research findings as a panelist and keynote speaker in national and international conferences.
Meet Your Mentors
Abdul
Undergraduate student double majoring in Computer Science and Mathematics as well as Finance.
Steven
Holds a Bachelor of Science in Engineering and working towards a Master of Science degree in Computer Engineering. Currently working in technology, specializing in designing and producing high-resolution radar modules.
Patrick
Undergraduate student working towards a bachelor's degree in business management.
How to Apply
It’s easy. No transcripts or letters of recommendation are required. Our application asks you to provide the following:
- Basic contact information for you and your parent or guardian.
- Why you wish to take this course, and a bit of your story, through writing, video, photos—any media you prefer.
Begin the guided process. It should take only a few minutes to answer the questions.
Begin the processWant to Know More?
Sign up for more information and we’ll be in touch.
Frequently Asked Questions
How will you be graded? What are assignments like? How much time do you have to turn around a project? When do you find out if you’re admitted? Find answers to your questions here.
Answers to Your Questions HereScholarships
We offer need-based scholarships for participating students who exhibit high potential and an inability to pay the full tuition.
- If you haven’t applied to the program, apply here. After submitting your application, click “Apply for a need-based scholarship” on the confirmation page to request a scholarship.
- If you’ve already applied to the program, sign in to your profile to check your scholarship status. If we don’t have a scholarship request on file, click “Apply for a need-based scholarship” to request a scholarship.
The University reserves the right to modify the course as may become necessary.