Ensure the Safety and Integrity of Critical Information
Next start date
In today’s world of complex, interconnected IT systems, there has never been a better time to work in information security. Networks and data are constantly under attack, and tech professionals must be able to deploy the latest tools and strategies to protect their valuable data.
This certificate program provides a thorough technical review of information security issues and gives you hands-on experience in combating common threats. You’ll investigate different types of attacks and learn how to apply protective measures to all aspects of a company’s IT operations. Make sure that your skills are up to date and your systems are well-defended in the pitched battle for information security.
Software developers and analysts, or people with system, database, security or network administration experience.
Applicants must meet one of the following requirements:
If you're not a native English speaker, you’ll need to have at least basic English language skills to enroll. To learn more, see English Language Proficiency Requirements.
International students are welcome to apply to an online offering of this program, which doesn’t require a visa. To enroll in a classroom offering, you must have a visa that permits study in the United States. This program does not enable students to obtain or maintain F-1 visa status. For more information, see Admission Requirements for International Students.
You must have access to a computer with the ability to run a variety of security tools, with a minimum 8GB of RAM. Classroom students must bring laptops. A high-speed Internet connection is recommended.
You earn the certificate by regularly attending class and successfully completing all required courses. For more information, see Completing Your Program.
By completing this program you’ll be better prepared to take professional security certification exams, including Systems Security Certified Practitioner (SSCP) and Certified Information Systems Security Professional (CISSP).
Complete the courses listed below to earn the certificate. You may be able to take individual courses without enrolling in the certificate program; check the course pages for details.
Foundations of Information Security
Security Tools & Technologies
Applied Security Solutions & Emerging Trends
Certificate in Information Systems Security
Approved by the UW Department of Computer Science & Engineering.
View this program's advisory board.
Each of our programs uses an advisory board to review content, guide design and recommend updates to ensure the program remains current as the field of study evolves. By tapping the minds of the top thinkers, doers and leaders in the field, we offer a transformational learning experience. The following individuals serve as the advisory board for this program.
Chuck Benson, Chair, UW IT Services Management Board, Facilities Services IT, University of Washington
Naomi Bogenschutz, Program Manager, UW Educational Outreach
Rovy Branon, Vice Provost, University of Washington Continuum College
Marc Dupuis, Director of Human Factors, Center for Information Assurance & Cybersecurity, University of Washington; Lecturer, Institute of Technology, University of Washington Tacoma
Barbara Endicott-Popovsky, Director, UW Center for Information Assurance and Cybersecurity
Peter H. Gregory, Executive Director - Executive Advisory, Optiv Security
Ernie Hayden, Executive Consultant, Securicon, LLC
Ryan Heffernan, Senior Security Program Manager, Microsoft
Jason Hernandez, Network Architect, Tableau Software
Jim Poland, Cyber Threat Analyst, University of Washington
Ray Pompon, Security Director, Linedata
Brian Sears, Director of Technology, Hellam Varon
Mike Sheward, Manager of Global Security Operations, Concur Technologies
Attend class in person and engage face to face with your classmates and instructors as part of a highly interactive curriculum. Assignments and other course materials are delivered through Canvas, a web-based learning management system that also serves as a communications hub. You must attend at least 60 percent of your class sessions in person. You may view the remainder online, either as recorded sessions or in real time (limit of two live-streamed sessions per quarter).
Courses are streamed online in real time from the classroom. You interact with your instructors and fellow students via chat, using Adobe Connect web conferencing software. Assignments and other course materials are delivered through Canvas, a web-based learning management system that also serves as a communications hub.For added flexibility, each quarter you may view recordings of up to 40 percent of your class sessions instead of attending in real time. You also can attend the classroom sessions in person if space is available.
Our special blended programs combine the convenience of online study with the vibrancy of in-person classes for a unique learning experience.
Not available for this program
With the rise in news stories around hacked customer data and personal photos being leaked online, it’s no surprise that cybersecurity professionals are more in demand than ever. In fact, jobs for these information security analysts are expected to increase by 37% from 2012 to 2022. Find out how you can hack into the field here.
If you’re thinking about heading back to school, you’re probably also wondering how you’ll pay for it. To help you figure that out, we’ve put together a list of ways to help fund your education.
Explore the foundations of ethical hacking, including reconnaissance, exploitation and the rules of engagement. Learn how to protect your organization's valuable information.
Evaluate the costs and benefits of various information security approaches. Learn how to create and implement comprehensive risk management programs for organizations of all sizes.
Build your expertise in creating secure software systems, and develop your understanding of how design and construction elements impact security.
Develop the specialized skills required to recover, preserve and evaluate digital forensic evidence in support of civil, criminal and internal investigations.