Secure Company Information From Serious Threats
Next start date
September 27, 2017
Keeping vital business data safe and secure is one of the biggest IT challenges any organization faces. Professionals with high-level information security training are in great demand as businesses develop strategies and processes for keeping their systems safe from attack.
In this three-course certificate program, you’ll examine key concepts in this rapidly evolving field. We’ll survey the major types of threats and how they can be mitigated. You’ll evaluate the costs and benefits of various security approaches. Develop the ability to create and implement comprehensive risk management programs for organizations of all sizes.
▸ Related Article: Hot Jobs: Cybersecurity Analyst
IT professionals and those who work in data security and risk management. If you’d like basic technical training in this field, consider taking our Certificate in Cybersecurity.
If you're not a native English speaker, you’ll need to have at least basic English language skills to enroll. To learn more, see English Language Proficiency Requirements.
International students are welcome to apply to an online offering of this program, which doesn’t require a visa. To enroll in a classroom offering, you must have a visa that permits study in the United States. This program does not enable students to obtain or maintain F-1 visa status. For more information, see Admission Requirements for International Students.
This program requires the use of EC-Council iLabs software; you can purchase this software through the program for $125. You must have access to a computer, and we recommend a high-speed Internet connection.
You earn the certificate by regularly attending class and successfully completing all required courses. For more information, see Completing Your Program.
Barbara Endicott-Popovsky, an instructor for the Certificate in Information Security & Risk Management, discusses the dire need for professionals with skills in this field.
Complete the courses listed below to earn the certificate. You may be able to take individual courses without enrolling in the certificate program; check the course pages for details.
Information Security & Risk Management in Context
Building an Information Risk Management Toolkit
Designing & Executing Information Security Strategies
Certificate in Information Security & Risk Management
Approved by the UW Information School.
View this program's advisory board.
Each of our programs uses an advisory board to review content, guide design and recommend updates to ensure the program remains current as the field of study evolves. By tapping the minds of the top thinkers, doers and leaders in the field, we offer a transformational learning experience. The following individuals serve as the advisory board for this program.
Phil Attfield, CEO, IDELIX
Kirk Bailey, Chief Information Security Officer, University of Washington
Orlando Baiocchi, Faculty, Institute of Technology, University of Washington, Tacoma
Scott Barker, Director of Information Technology, UW Information School
Chuck Benson, Director of Information Technology and Information Management, Anesthesiology and Pain Medicine, UW School of Medicine
Rovy Branon, Vice Provost, University of Washington Continuum College
John Christiansen, Managing Director, Christiansen IT Law
Terry Davis, Chief Scientist, iJet OnBoard
Barbara Endicott-Popovsky, Ph.D., Research Associate Professor , UW Information School; Director, Center for Information Assurance and Cybersecurity
Deborah Frincke, Deputy Director for Research, National Security Agency
Peter Gregory, Executive Director - Executive Advisory, Optiv Security
Brian Haller, Consultant, Sila Solutions Group
Ernie Hayden, Managing Principal of Energy Security, Global Energy and Utility Vertical, Verizon Business
Nick Multari, Asymmetric Resilient Cybersecurity Initiative Lead, Pacific Northwest National Lab
Ivan Orton, Senior Deputy Prosecutor (Cyber Crime), King County Prosecutor’s Office
Ray Pompon, Senior Security Officer, HCL CapitalStream
Amelia Phillips, Dean, STEM Disciplines, Highline Community College
Todd Plesco, Chief Information Security Officer, Chapman University; Former Chapter President of WA State InfraGard
Radha Poovendran, Associate Director for Research, Center for Information Assurance and Cybersecurity, and Associate Professor, UW Electrical Engineering
Seth Shapiro, Senior Vice President and Risk Strategist, Kibble & Prentice
Michael Sheward, Manager of Global Security Operations, Concur
Michael Simon, Chief Technical Officer and Founder, Creation Logic, and Chapter President, Seattle Infragard
Frank Simorjay, Security Analyst, Microsoft Corp.
Ilanko Subramaniam, Senior TwC Strategist, Microsoft Corporation
Lalitha Subramanian, Program Manager, UW Professional & Continuing Education
Download the application form (PDF)
Apply online, or submit an application packet that includes:
We’re currently accepting applications and will be reviewing them in the order they’re received. We’ll accept applications until the program closes.
We’ll contact you within two weeks of receiving your application materials to let you know if you’ve been accepted to the program.
If you’re accepted, we’ll send you details about your first-term course, including information on paying your course fee. Your course fee is due four weeks before the first class.
With the exception of the one-time application fee, certificate program fees are charged on a quarterly basis. Payment is due when you register.
Course fees do not include textbook costs or other materials.
Drops, Withdrawals & Refunds
Course fees do not include textbook costs or other materials. The technology fee is based on the number of credits you are taking. It is not charged during summer quarter.
Attend class in person and engage face to face with your classmates and instructors as part of a highly interactive curriculum. Assignments and other course materials are delivered through Canvas, a web-based learning management system that also serves as a communications hub. You must attend at least 60 percent of your class sessions in person. You may view the remainder online, either as recorded sessions or in real time (limit of two live-streamed sessions per quarter).
Courses are streamed online in real time from the classroom. You interact with your instructors and fellow students via chat, using Adobe Connect web conferencing software. Assignments and other course materials are delivered through Canvas, a web-based learning management system that also serves as a communications hub.For added flexibility, each quarter you may view recordings of up to 40 percent of your class sessions instead of attending in real time. You also can attend the classroom sessions in person if space is available.
Our special blended programs combine the convenience of online study with the vibrancy of in-person classes for a unique learning experience.
Not available for this program
Executive Director, Center for Information Assurance and Cybersecurity
Fellow, Aberystwyth University, Wales
Chief Information Security and Privacy Officer, King County
Cybersecurity Product Development Specialist, Boeing
President and Co-Founder, Entrant Security
Senior Director of Professional Services, Maclear, LLC
Chief Technical Officer, Creation Logic
With the rise in news stories around hacked customer data and personal photos being leaked online, it’s no surprise that cybersecurity professionals are more in demand than ever. In fact, jobs for these information security analysts are expected to increase by 37% from 2012 to 2022. Find out how you can hack into the field here.
Four students from the Information Security & Risk Management certificate program were recognized with the Up-and-Coming Information Security Professional award at the (ISC)² conference.
Switching from film studies to the real-life drama of information security is a big change, to say the least. Read how Justin Brecese made the move with the help of the Certificate in Information Security & Risk Management.
Explore the foundations of ethical hacking, including reconnaissance, exploitation and the rules of engagement. Learn how to protect your organization's valuable information.
Receive a thorough technical review of information security issues. Investigate different types of attacks and learn how to apply protective measures to all aspects of a company’s IT operations.
Build your expertise in creating secure software systems, and develop your understanding of how design and construction elements impact security.