Cybersecurity: Protecting Our Digital Future

Have you or anyone you know ever experienced a cyberattack? Do you love solving complex issues? Cybersecurity is a fast-paced, exciting field that shows no signs of slowing. This course unveils how cyberspace evolved, how it opened the door for cyberattacks, and how the world of the dark web came to exist. Learn from industry experts from the FBI, CISA, and more about the vulnerabilities that exist on the web, how they’re being exploited, and how cybersecurity experts are unraveling them. See how innovations in AI are affecting cybersecurity and find out what the future entails for this field.

Program Dates

Choose the course length that works for you: 1-week intensives, 2-week sessions, and 4-week sessions


For students ages 13 and up



Step into the World of Cybersecurity

Learn How Cyberspace Evolved.

Study the history of cyberspace, eCommerce’s boom, and how the growing e-economy led to increased hacking. Explore ethical dilemmas like the struggle between profitability and enforcing security.

Identify Types of Attacks, Plus the “Who’s” and “Why’s” of Hacking.

Explore cybercriminals, their motivations, and targets. Learn why there’s a blurred line between “good” and “bad” actors. Study attack types and targets, threat actors, and counter-attack measures.

Dig into the Most Common Attack Vectors.

Learn how rapid digital transformation led to technology with embedded design flaws. Discover how certain behaviors put people at cyberattack risk and how to protect yourself online.

Cybersecurity and AI: The Good, the Bad, and the Ugly.

Define artificial intelligence and its role in cybersecurity. Discover different types of AI hacks, how criminals exploit AI, and the ethics surrounding using malicious AI.

Decide if Cybersecurity Is a Good Fit for You.

Examine the skills required to achieve professional certifications in cybersecurity, the various disciplines in the field, and the role diversity plays in this popular, emerging job market.

Explore College Majors and Future Careers in Cybersecurity.

Topics covered in this course offer a good background for potential college majors and career paths related to IT, systems engineering, the government, cyber threats, and more.

How You Will Benefit

  • Understand how the evolution of cyberspace has created new opportunities for criminals and cybersecurity professionals.
  • Have the ability to define the motivations, methods, capabilities, and targets used by cybercriminals.
  • Be able to identify the main factors responsible for human and technological vulnerabilities.
  • Discover the scope of the cybersecurity profession and upcoming trends.
  • Examine and discuss diverse ethical and moral dilemmas in cybersecurity.
  • Complete a Final Capstone Project to demonstrate what you’ve learned.
  • Earn a Certificate of Completion from Georgetown University.

Student completing Georgetown's Pre-College Cybersecurity course on her laptop.

Three Learning Advantages Designed for You

Final Capstone Project

This online course culminates in a Final Capstone Project that allows you to choose from two project options. 

Option 1:

  • Your friend’s computer got hacked. Assess the methods used by the ransomware criminal. Create a simulated text or email thread between the friends. 

Option 2:

  • Create a presentation/poster using infographics that explain the common cybersecurity attacks encountered by teens. 


You’ll receive guidance from a mentor who can support you and answer questions as you deepen your learning experience. You can expect:

  • Encouragement and direction on all assignments.
  • Inspiration, motivation and confidence to help you succeed.
  • Brainstorming and ideation help as you prepare for your Final Capstone Project.

Flexible Learning

  • 100% online learning that works with your schedule.
  • Flexible format: you’ll learn through video lectures. Tune in anytime that works for you.
  • 20 to 30 hours of total instruction and course work, including engaging multimedia, simulations, and curated assignments for which you will receive guidance and support from mentors.

Apply Now for the Next Available Course

June 30 - July 14

Length: 2 weeks

Cost: $1,795.00

Application Deadline: Sunday, June 23, 2024

Type: Enrichment

July 7 - July 21

Length: 2 weeks

Cost: $1,795.00

Application Deadline: Sunday, June 30, 2024

Type: Enrichment

July 7 - July 14

Length: 1 week

Cost: $1,795.00

Application Deadline: Sunday, June 30, 2024

Type: Enrichment

Course Designed by Georgetown University Faculty

Dr. Frederic Lemieux | Cybersecurity Instructor | Georgetown University

Dr. Frederic Lemieux, Ph.D.

Professor of the Practice and Faculty Director of the Master of Professional Studies in Cybersecurity Risk Management and Applied Intelligence programs

Dr. Frederic Lemieux is an innovative researcher and inspirational leader. He specializes in the field of global threats and homeland security. He earned a doctoral degree in criminology from the University of Montreal in 2002 at the age of 26. Dr. Lemieux has created and managed several cutting-edge academic programs in intelligence, policing, homeland security, and cybersecurity. Dr. Lemieux’s work has been published in numerous preeminent journals and books. He has presented research findings as a panelist and keynote speaker in national and international conferences.

Meet Your Mentors

Abdul | Georgetown Cybersecurity Course Mentor


Undergraduate student double majoring in Computer Science and Mathematics as well as Finance.

Steven | Georgetown Cybersecurity Course Mentor


Holds a Bachelor of Science in Engineering and working towards a Master of Science degree in Computer Engineering. Currently working in technology, specializing in designing and producing high-resolution radar modules.

Patrick | Georgetown Cybersecurity Course Mentor


Undergraduate student working towards a bachelor's degree in business management.

How to Apply

It’s easy. No transcripts or letters of recommendation are required. Our application asks you to provide the following:

  • Basic contact information for you and your parent or guardian.
  • Why you wish to take this course, and a bit of your story, through writing, video, photos—any media you prefer.

Begin the guided process. It should take only a few minutes to answer the questions.

Begin the process

Student applying to Georgetown's Cybersecurity course.

Want to Know More?

Sign up for more information and we’ll be in touch.


Our application process is easy. You can expect a prompt decision.

Start Application

Frequently Asked Questions

How will you be graded? What are assignments like? How much time do you have to turn around a project? When do you find out if you’re admitted? Find answers to your questions here.

Answers to Your Questions Here


We offer need-based scholarships in each cohort to students exhibiting high potential and an inability to pay full tuition. If you would like to be considered for a scholarship but you:

  • Haven’t applied to the program, complete your application now. The scholarship application is included.
  • Applied to the program and didn’t fill out a scholarship request, resume your application and click “Apply for Scholarship”.
  • Are unsure about whether or not you applied for a scholarship, reach out to us at for assistance.

The University reserves the right to modify the course as may become necessary.