Secure Company Information From Serious Threats
Next start date:
April 6, 2020
Keeping vital business data safe and secure is one of the biggest IT challenges any organization faces. Professionals with high-level information security training are in great demand as businesses develop strategies and processes for keeping their systems safe from attack.
In this three-course certificate program, you’ll examine key concepts in this rapidly evolving field. We’ll survey the major types of threats and how they can be mitigated. You’ll evaluate the costs and benefits of various security approaches. Develop the ability to create and implement comprehensive risk management programs for organizations of all sizes.
▸ Related Article: Hot Jobs: Cybersecurity Analyst
▸ Related Article: Meeting the Cybersecurity Challenges of the Future
IT professionals and those who work in data security and risk management or those who are interested in information security and risk management.
If you’d like basic technical training in this field, consider taking our Certificate in Cybersecurity. We also offer an introductory-level Essentials of Cybersecurity certificate program.
Applicants must have:
Because this is program is offered by UW Bothell, students who are seniors at that campus and who are interested in information security and risk management are also encouraged to apply. For more information, students should contact the Center for information Assurance & Cybersecurity (CIAC) at UW Bothell.
If you're not a native English speaker, you’ll need to have at least basic English language skills to enroll. To learn more, see English Language Proficiency Requirements.
Because this offering is 100 percent online, no visa is required and international students are welcome to apply. For more information, see Admission Requirements for International Students.
You must have access to a computer, and we recommend a high-speed internet connection. This program also requires the use of Cyberworld Institute software (purchase required).
You earn the certificate by adhering to the program's attendance policy and successfully completing all required courses. For more information, see Earning the Certificate.
Barbara Endicott-Popovsky, an instructor for the Certificate in Information Security & Risk Management, discusses the dire need for professionals with skills in this field.
Complete the courses listed below to earn the certificate. You may be able to take individual courses without enrolling in the certificate program; check the course pages for details.
Information Security & Risk Management in Context
Building an Information Risk Management Toolkit
Designing & Executing Information Security Strategies
Certificate in Information Security & Risk Management
Approved by UW Bothell Academic Affairs.
View this program's advisory board.
Each of our programs uses an advisory board to review content, guide design and recommend updates to ensure the program remains current as the field of study evolves. By tapping the minds of the top thinkers, doers and leaders in the field, we offer a transformational learning experience. The following individuals serve as the advisory board for this program.
Phil Attfield, CEO, IDELIX
Kirk Bailey, Chief Information Security Officer, University of Washington
Orlando Baiocchi, Faculty, Institute of Technology, University of Washington Tacoma
Scott Barker, Director of Information Technology, UW Information School
Chuck Benson, Director of Information Technology and Information Management, Anesthesiology and Pain Medicine, UW School of Medicine
John Christiansen, Managing Director, Christiansen IT Law
Terry Davis, Chief Scientist, iJet OnBoard
Barbara Endicott-Popovsky, Research Associate Professor, UW Information School; Director, Center for Information Assurance & Cybersecurity
Deborah Frincke, Deputy Director for Research, National Security Agency
Peter Gregory, Executive Director - Executive Advisory, Optiv Security
Brian Haller, Consultant, Sila Solutions Group
Ernie Hayden, Managing Principal of Energy Security, Global Energy and Utility Vertical, Verizon Business
Nick Multari, Asymmetric Resilient Cybersecurity Initiative Lead, Pacific Northwest National Lab
Ivan Orton, Senior Deputy Prosecutor (Cyber Crime), King County Prosecutor’s Office
Ray Pompon, Senior Security Officer, HCL CapitalStream
Amelia Phillips, Dean, STEM Disciplines, Highline Community College
Todd Plesco, Chief Information Security Officer, Chapman University; Former Chapter President of WA State InfraGard
Radha Poovendran, Associate Director for Research, Center for Information Assurance and Cybersecurity; Associate Professor, UW Electrical Engineering
Seth Shapiro, Senior Vice President and Risk Strategist, Kibble & Prentice
Michael Sheward, Manager of Global Security Operations, Concur
Michael Simon, Chief Technical Officer and Founder, Creation Logic; Chapter President, Seattle Infragard
Frank Simorjay, Security Analyst, Microsoft Corp.
Ilanko Subramaniam, Senior TwC Strategist, Microsoft Corporation
Lalitha Subramanian, Assistant Director, International & Academic Programs, UW Continuum College
Ginger Armbruster describes the “life-changing” impact the Certificate in Information Security & Risk Management had on her career.
Start and finish your program with the same group of students, with frequent opportunities to interact with your instructors and classmates along the way. Courses are 100 percent online, with set due dates for assignments but no class meetings. Learn More »
Fight the data breaches. We offer an array of information security programs designed to help you keep the hackers at bay and your company’s assets safe.
Your company can help pay for that career-boosting certificate or degree program — if you know how to ask. Find out how to best position yourself for educational assistance.
With the goal of attracting more students to a rapidly growing field, the UW is offering a new Essentials of Cybersecurity online program through edX.
Four students from the Information Security & Risk Management certificate program were recognized with the Up-and-Coming Information Security Professional award at the (ISC)² conference.
Switching from film studies to the real-life drama of information security is a big change, to say the least. Read how Justin Brecese made the move with the help of the Certificate in Information Security & Risk Management.
Explore the foundations of ethical hacking, including reconnaissance, exploitation and the rules of engagement. Learn how to protect your organization's valuable information.
Receive a thorough technical review of information security issues. Investigate different types of attacks and learn how to apply protective measures to all aspects of a company’s IT operations.
Learn how to guard against, detect and correct security threats through areas such as cryptography, secure development, ethical hacking and incidence response.
Be among the first to receive timely program info, career tips, industry trends and more.