Bachelor of Science

Computer and Information Systems Security

Secure your future with a cybersecurity degree from Western Washington University. Western's Computer and Information Systems Security (CISS) program prepares individuals to fill the urgent need for trained personnel in professional, high-wage positions.

Want to learn more?

Send us your questions by entering your information below. A program coordinator will contact you shortly. 

Location of Choice



Cybersecurity is a growing field of administrative and technical specialties involved in protecting computer systems, programs, and digital information from mild to severe forms of cyber threats and exploitation, such as cyber terrorism, data breaches, viruses, and more.


  1. Convenient Locations

    Pursue your CISS degree at Western Washington University's main campus in Bellingham, WA or at the WWU Center at Olympic College in Poulsbo, WA.

  2. Transfer  

    Western's CISS degree program builds upon the knowledge and experience gained from the following community college programs:

    • Olympic College - AAS-T, Information Systems Specialist, Security
    • Peninsula College - AAS-T in Cybersecurity and Computer Forensics
    • Whatcom Community College - AAS-T in Cybersecurity
  3. Experienced Faculty

    Learn from professors with international experience in computer security, software engineering, quality insurance, and more.


Western's two-year CISS degree program is offered in two locations. 

Bellingham Program
Application Deadline: March 1
Priority Financial Aid Deadline: January 31
How to apply - click here to learn more.

Poulsbo Program
Western's CISS degree program begins Fall Quarter 2017 in Poulsbo
Application Deadline: March 1
Priority Financial Aid Deadline: January 31
How to apply - click here to learn more.

Career Options

Graduates of Western's CISS degree program secure positions in four different roles:

Computer network security administrator - administrative role that emphasizes the establishment and implementation of security policies for an organization.

Secure software development specialist - a role centered around producing, monitoring, and auditing secure software, as well as advising on security vulnerabilities.

Reactive forensic practitioner - a role concerned with recovering the assets, data, and operability of an organization after a serious security breach and helping strengthen preventative measures.

Proactive forensic practitioner - a role concerned with identifying, capturing, and analyzing suspected malware before it has widespread impact.