Bachelor of Science

Computer and Information Systems Security

Secure your future with a cybersecurity degree from Western Washington University. Western's Computer and Information Systems Security (CISS) program prepares individuals to fill the urgent need for trained personnel in professional, high-wage positions.

Want to learn more?

Click here to visit our website or send us your questions by entering your information below. A program coordinator will contact you shortly. 

Location of Choice



Cybersecurity is a growing field of administrative and technical specialties involved in protecting computer systems, programs, and digital information from mild to severe forms of cyber threats and exploitation, such as cyber terrorism, data breaches, viruses, and more.


  1. Convenient Locations

    Pursue your Cybersecurity degree at Western Washington University's main campus in Bellingham, WA or at the WWU Center at Olympic College in Poulsbo, WA.

  2. Transfer  

    Western's CISS program builds upon the knowledge and experience gained from the following community college programs:

    • Olympic College - AAS-T, Information Systems Specialist, Security
    • Peninsula College - AAS-T in Cybersecurity and Computer Forensics
    • Whatcom Community College - AAS-T in Cybersecurity
  3. Experienced Faculty

    Learn from professors with international experience in computer security, software engineering, quality insurance, and more.


Bellingham CISS Program
Priority Financial Aid Deadline: January 31
Application Deadline: March 1
How to apply - click here to learn more.

Poulsbo CISS Program
Priority Financial Aid Deadline: January 31
Application Deadline: March 1

How to apply - click here to learn more.

Career Options

Graduates of Western's CISS program could potentially secure positions in a vareity of roles including:

Computer network security administrator - administrative role that emphasizes the establishment and implementation of security policies for an organization.

Secure software development specialist - a role centered around producing, monitoring, and auditing secure software, as well as advising on security vulnerabilities.

Reactive forensic practitioner - a role concerned with recovering the assets, data, and operability of an organization after a serious security breach and helping strengthen preventative measures.

Proactive forensic practitioner - a role concerned with identifying, capturing, and analyzing suspected malware before it has widespread impact.