Pathway to Cybersecurity Management
Course Description
This Pathway is designed to provide students with an overview of the core concepts of information security and cybersecurity. Information security professionals work to protect information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability of organizational data. Students will learn how training and security awareness can help an organization reduce its risk.
1 Credit Equivalency
Each Pathways experience is equivalent to one academic credit hour. Students can choose to pay $499 to have the one credit transcripted, and they can apply it to a degree in any of our Adult Degree Programs, including Cybersecurity Management. George Fox University is accredited by the Northwest Commission on Colleges and Universities.
If you're interested in purchasing credit for the course, you'll need to complete the course requirements by one of the following deadlines: August 18, December 15 or April 26.
All Pathways courses are self-directed, allowing you to complete the course on your own time — and at your own pace.
It's totally free!
Meet the Prof

Aurae Beidler, MHA, RHIA, CHC, CHPS
Aurae Beidler brings a depth of experience in information management and healthcare compliance. Before joining George Fox University, she worked as a compliance and privacy officer with the Linn County Department of Health Services as well as taught health information management and healthcare compliance at various universities and colleges in the region. With over 20 years of experience in healthcare, she lends important context to data governance, management and security courses – and why these topics are crucial in today's world.
Learning Outcomes
After completing this course, students will be able to:
-
Describe the main concepts of information security.
-
Explain the importance of CIA: confidentiality, integrity, and availability.
-
Define cybersecurity and digital forensics.
-
Apply an understanding of the need for information security plans in a real world setting.
-
Explain how training and awareness can reduce risk.
What to Expect
The course includes videos, readings, quizzes, downloadable resources, short written assignments, forum discussions, video feedback, and optional Zoom sessions with our faculty experts.
Not interested in credit? No sweat! Pathways are built for you to explore, meaning there's no expectation that you complete readings or submit assignments.
Online Textbooks or E-Resources
Free open-access articles and videosGeneral Assignments / Projects
Assignments include two discussions, two check your understandings, and one topic of interest paper.
Aurae Beidler
MHA, RHIA, CHC, CHPS
Cybersecurity is a hot topic issue that may seem to require sophisticated computer knowledge yet as we pull back the layers in our discovery, you will find just how human-centered this subject is. As we explore people, processes and technology, I'll share how important continual evaluation of risk is, how planning is important in incident response and what impact developing an organizational culture of cyber readiness can have on your organization and your own cyber savviness.
Get Started
All Pathways courses are self-directed, allowing you to complete the course on your own time — and at your own pace.
It's totally free!