{"id":33517,"date":"2024-10-10T13:38:46","date_gmt":"2024-10-10T20:38:46","guid":{"rendered":"https:\/\/www.uwb.edu\/stem\/?page_id=33517"},"modified":"2025-09-16T17:15:59","modified_gmt":"2025-09-17T00:15:59","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity","title":{"rendered":"Minor in Cybersecurity"},"content":{"rendered":"\n<p>The Cybersecurity minor is designed to address the increasing demand for skilled professionals in a multi-disciplinary field that is critical to safeguarding organizations, governments, and vital infrastructure from diverse threats. This minor is ideal for students from both technical and non-technical backgrounds, recognizing that a wide range of expertise is essential to effectively tackle today\u2019s cybersecurity challenges.<\/p>\n\n\n\n<p>Through a comprehensive curriculum, the Cybersecurity minor equips students with foundational knowledge in both technical and non-technical aspects of cybersecurity. By integrating this knowledge with their primary fields of study, students will be prepared to make meaningful contributions to their organizations\u2019 cybersecurity strategies.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Declaring the minor<\/h2>\n\n\n\n<p class=\"is-style-default\"><strong>The Cybersecurity minor has no prerequisites<\/strong>, and any undergraduate student\u2014including pre-major students\u2014may declare the minor at any time.<\/p>\n\n\n\n<p>Students pursuing their <a href=\"https:\/\/www.uwb.edu\/stem\/undergraduate\/majors\/bscsse\/curriculum#iac-option\">B.S. in Computer Science &amp; Software Engineering<\/a> with an option in Information Assurance and Cybersecurity cannot also minor in cybersecurity.<\/p>\n\n\n\n<p>Interested students should contact their major program advisor and a UW Bothell Computer Science and Software Engineering Program advisor to determine the feasibility of pursuing the minor in Cybersecurity.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-dark-gold-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/uwb.campus.eab.com\/\">Find your advisor on Navigate<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Program requirements<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>At least 15 credits applied to the minor must have been completed at UW Bothell (in-person, online, or hybrid)<\/li>\n\n\n\n<li>At least 15 of the credits applied to the minor must be at the 300-400 level<\/li>\n\n\n\n<li>At least 10 credits applied to the minor must be courses from the Department of Computing &amp; Software Systems (i.e., CSS prefix)<\/li>\n\n\n\n<li>A minimum grade of 2.0 must be earned for each course applied to the minor<\/li>\n\n\n\n<li>Courses taken Satisfactory \/ Not Satisfactory will not be counted toward the minor<\/li>\n\n\n\n<li>At least 10 of the credits completed for this minor must not also simultaneously satisfy a major requirement<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Core requirements (17-20 credits)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybersecurity Foundations (CSS 310, INFO 310, or T INFO 310) (5 credits)<\/li>\n\n\n\n<li>Ethics, Policy, and Law (CSS 211, CSS 315, CSS 411, INFO 351, or TCSS 325) (4-5 credits)<\/li>\n\n\n\n<li>Networking (CSS 431, CSS 432, T INFO 250, T INFO 451, TCSS 430, TCES 425, CSE 461, or INFO 314) (4-5<br>credits)<\/li>\n\n\n\n<li>Programming (CSS 112, CSS 132, CSS 142, CSE 121, CSE 122, CSE 142, TCSS 141, or TCSS 142) (4-5 credits)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Elective requirements (10-13 credits at the 300-400 level)<\/h3>\n\n\n\n<p>Approved electives for the Cybersecurity minor can be completed within the University of Washington tri-campus system. <\/p>\n\n\n\n<p>Some of the courses listed may not be offered on a regular basis and\/or may be restricted to<br>majors and\/or have other restrictions associated with them. The listing of these electives does not alter<br>said frequency of courses being offered or any existing requirements or restrictions.<\/p>\n\n\n\n<p><strong>Bothell<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CSS 320 Digital Forensics (5)<\/li>\n\n\n\n<li>CSS 337 Secure Systems (5)<\/li>\n\n\n\n<li>CSS 415 Emerging Topics in Information Assurance and Cybersecurity (1-5)<\/li>\n\n\n\n<li>CSS 416 Ethical Hacking and Penetration Testing (5)<\/li>\n\n\n\n<li>CSS 436 Cloud Computing (5)<\/li>\n\n\n\n<li>CSS 477 Foundations of Secure Software Development (5)<\/li>\n\n\n\n<li>CSS 486 Machine Intelligence (5)<\/li>\n\n\n\n<li>B BUS 300 Organizational Behavior, Ethics, and Inclusivity (5)<\/li>\n\n\n\n<li>B BUS 412 Advanced Business Law (5)<\/li>\n\n\n\n<li>B BUS 458 Risk Modeling (5)<\/li>\n\n\n\n<li>B BUS 461 Business, Government, and Society (5)<\/li>\n\n\n\n<li>B BUS 476 New Technology and Future Markets (5)<\/li>\n\n\n\n<li>BIS 415 Public Policy and Law (5)<\/li>\n\n\n\n<li>BIS 421 Technology Policy (5)<\/li>\n\n\n\n<li>BISLEP 301 Law, Economics, and Public Policy (5)<\/li>\n\n\n\n<li>BISLEP 302 Policy Analysis (5)<\/li>\n\n\n\n<li>BISSTS 307 Science, Technology, and Society (5)<\/li>\n\n\n\n<li>BISSTS 355 History of Science and Technology (5)<\/li>\n<\/ul>\n\n\n\n<p><strong>Seattle<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>INFO 312 Enterprise Risk Management (4)<\/li>\n\n\n\n<li>INFO 415 Emerging Topics in Information Assurance and Cybersecurity (1-5)<\/li>\n\n\n\n<li>I S 410 Networks and Cybersecurity (4)<\/li>\n\n\n\n<li>CSE 484 Computer Security (4)<\/li>\n\n\n\n<li>POL S 370 Privacy (5) \/ JSIS B 370 (5)<\/li>\n\n\n\n<li>POL S 410 Technology, Politics, and the State (5)<\/li>\n\n\n\n<li>POL S 451 Communication Technology and Politics (5) \/ COM 407 (5)<\/li>\n\n\n\n<li>POL S 465 Law and Public Policy in the United States (5)<\/li>\n\n\n\n<li>CFRM 426 FinTech, Blockchains, and Cryptocurrencies (4)<\/li>\n<\/ul>\n\n\n\n<p><strong>Tacoma<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>TCSS 431 Network Security (5)<\/li>\n\n\n\n<li>TCSS 481 Computer Security (5)<\/li>\n\n\n\n<li>TCSS 487 Cryptography (5)<\/li>\n\n\n\n<li>TCES 431 Essentials of VLSI Circuit Testing and Hardware Security (5)<\/li>\n\n\n\n<li>TCES 461 Hardware for Cryptography (5)<\/li>\n\n\n\n<li>T INFO 441 Network Security (5)<\/li>\n\n\n\n<li>T INFO 442 Computer Security (5)<\/li>\n\n\n\n<li>T INFO 443 Digital Forensics (5)<\/li>\n\n\n\n<li>T INFO 444 Mobile Digital Forensics I (5)<\/li>\n\n\n\n<li>T INFO 445 Mobile Digital Forensics II (5)<\/li>\n\n\n\n<li>T INFO 446 Mobile Digital Forensics III (5)<\/li>\n\n\n\n<li>T INFO 453 Wireless Networking (5)<\/li>\n\n\n\n<li>T INFO 461 Organizational Information Assurance (5)<\/li>\n\n\n\n<li>T INFO 462 Building an Information Risk Management Toolkit (5)<\/li>\n\n\n\n<li>T INFO 463 Establishing and Managing Information Assurance Strategies (5)<\/li>\n\n\n\n<li>T INFO 476 Threat Modeling (5)<\/li>\n\n\n\n<li>TCOM 454 Communications Law (5)<\/li>\n\n\n\n<li>TCOM 465 Contemporary Free Speech Issues (5)<\/li>\n\n\n\n<li>TCOM 481 Communication Regulation and Policy (5)<\/li>\n\n\n\n<li>TPOL S 300 Mass Media and U.S. Politics (5)<\/li>\n\n\n\n<li>TPOL S 371 The Politics of Security (5)<\/li>\n\n\n\n<li>TPSYCH 352 Judgment and Decision-Making (5)<\/li>\n\n\n\n<li>T PHIL 361 Ethics in Society (5)<\/li>\n\n\n\n<li>TMATH 412 Cryptography: Theory and Practice (5)<\/li>\n\n\n\n<li>T LAW 363 Law in Society (5)<\/li>\n\n\n\n<li>T LAW 465 Law and Public Policy in the United States (5)<\/li>\n\n\n\n<li>TBANLT 450 Decision Modeling (5)<\/li>\n\n\n\n<li>TBANLT 460 Predictive Analytics (5)<\/li>\n\n\n\n<li>TBANLT 485 Business Intelligence (5)<\/li>\n\n\n\n<li>T ACCT 471 Internal Auditing (3)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Registration<\/h2>\n\n\n\n<p>Some Computing &amp; Software Systems courses are restricted to students in the major for <strong><a href=\"\/registrar\/policies\/periods\">registration period 1<\/a><\/strong>, but become available to all students from registration period 2 onwards. You can contact an academic advisor for assistance with registration.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-dark-gold-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/uwb.campus.eab.com\/\">Find your advisor on Navigate<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Petitions<\/h2>\n\n\n\n<p>Cybersecurity-related courses that are not included on the elective lists are considered on a case-by-case basis. If you have a syllabus, letter from the instructor, or other detailed description for the class you wish to use as an elective, you may submit a petition to request for the course to count.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-dark-gold-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/forms.office.com\/pages\/responsepage.aspx?id=W9229i_wGkSZoBYqxQYL0hs3Q7yQqENCvl_eAkWFOddUMjhDWFE0R1hVVzBFUkZBVEJMS1NETFJWUS4u&amp;route=shorturl\">Submit a Cybersecurity minor petition<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Cybersecurity minor is designed to address the increasing demand for skilled professionals in a multi-disciplinary field that is critical to safeguarding organizations, governments, and vital infrastructure from diverse threats. This minor is ideal for students from both technical and non-technical backgrounds, recognizing that a wide range of expertise is essential to effectively tackle today\u2019s&#8230;<\/p>\n","protected":false},"author":528,"featured_media":0,"parent":23429,"menu_order":17,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_is_archived":false,"_archived_contact_email":"","footnotes":""},"class_list":["post-33517","page","type-page","status-publish","hentry"],"acf":{"related_links":{"toggle_visibility":false,"link_1":"","link_2":"","link_3":"","link_4":"","link_5":""},"highlight_box":{"toggle_visibility":false,"title":"","content":"","button":"","button_style":"angled-purple-button","button_screen_reader_text":""},"contact_type_1":{"toggle_visibility":true,"contact_title":"School of STEM Student Success","email":"stemsuccess@uw.edu","phone":"","box":"","address_line_1":"","address_line_2":"","location":""},"contact_type_2":{"toggle_visibility":false,"contact_title":"","email":"","phone":"","box":"","address_line_1":"","address_line_2":"","location":""},"social_media":{"toggle_visibility":false,"facebook_url":"","instagram_url":"","linkedin_url":"","twitter_url":"","youtube_url":""},"blog_archive_sidebar_visibility":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Minor in Cybersecurity - School of Science, Technology, Engineering &amp; Mathematics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Minor in Cybersecurity - School of Science, Technology, Engineering &amp; Mathematics\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity minor is designed to address the increasing demand for skilled professionals in a multi-disciplinary field that is critical to safeguarding organizations, governments, and vital infrastructure from diverse threats. This minor is ideal for students from both technical and non-technical backgrounds, recognizing that a wide range of expertise is essential to effectively tackle today\u2019s...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity\" \/>\n<meta property=\"og:site_name\" content=\"School of Science, Technology, Engineering &amp; Mathematics\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T00:15:59+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity\",\"url\":\"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity\",\"name\":\"Minor in Cybersecurity - School of Science, Technology, Engineering &amp; Mathematics\",\"isPartOf\":{\"@id\":\"\/#website\"},\"datePublished\":\"2024-10-10T20:38:46+00:00\",\"dateModified\":\"2025-09-17T00:15:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uwb.edu\/stem\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Undergraduate\",\"item\":\"https:\/\/www.uwb.edu\/stem\/undergraduate\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Minors\",\"item\":\"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Minor in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"\/#website\",\"url\":\"\/\",\"name\":\"School of Science, Technology, Engineering &amp; Mathematics\",\"description\":\"Just another UW Bothell site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Minor in Cybersecurity - School of Science, Technology, Engineering &amp; Mathematics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity","og_locale":"en_US","og_type":"article","og_title":"Minor in Cybersecurity - School of Science, Technology, Engineering &amp; Mathematics","og_description":"The Cybersecurity minor is designed to address the increasing demand for skilled professionals in a multi-disciplinary field that is critical to safeguarding organizations, governments, and vital infrastructure from diverse threats. This minor is ideal for students from both technical and non-technical backgrounds, recognizing that a wide range of expertise is essential to effectively tackle today\u2019s...","og_url":"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity","og_site_name":"School of Science, Technology, Engineering &amp; Mathematics","article_modified_time":"2025-09-17T00:15:59+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity","url":"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity","name":"Minor in Cybersecurity - School of Science, Technology, Engineering &amp; Mathematics","isPartOf":{"@id":"\/#website"},"datePublished":"2024-10-10T20:38:46+00:00","dateModified":"2025-09-17T00:15:59+00:00","breadcrumb":{"@id":"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors\/cybersecurity#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uwb.edu\/stem\/"},{"@type":"ListItem","position":2,"name":"Undergraduate","item":"https:\/\/www.uwb.edu\/stem\/undergraduate"},{"@type":"ListItem","position":3,"name":"Minors","item":"https:\/\/www.uwb.edu\/stem\/undergraduate\/minors"},{"@type":"ListItem","position":4,"name":"Minor in Cybersecurity"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"School of Science, Technology, Engineering &amp; Mathematics","description":"Just another UW Bothell site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/pages\/33517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/users\/528"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/comments?post=33517"}],"version-history":[{"count":11,"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/pages\/33517\/revisions"}],"predecessor-version":[{"id":35662,"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/pages\/33517\/revisions\/35662"}],"up":[{"embeddable":true,"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/pages\/23429"}],"wp:attachment":[{"href":"https:\/\/www.uwb.edu\/stem\/wp-json\/wp\/v2\/media?parent=33517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}