CYBER 289: More Information and Application

Course Description

For individuals and organizations involved in community work, human‑rights advocacy, and political activism, cybersecurity threats are an increasingly common reality of operating in the digital world. The social sector has long been targeted by ideological, political, and governmental opponents who seek to silence dissenting voices, and the widespread adoption of connected technologies by the social sector has created a new class of vulnerabilities.

Similar to university clinics in law and medicine, the UC Berkeley Cybersecurity Clinic trains teams of students in the Master of Information and Cybersecurity program to support social sector organizations in bolstering their security so they can defend themselves against digital threats. This course embeds student teams into the operations of politically vulnerable organizations and persons around the world, leveraging and expanding their existing technical cybersecurity skills, to develop and implement sound digital security practices that enable social change.

More information about the UC Berkeley Cybersecurity Clinic


Class Structure

In the classroom, students study the theories and practices of digital security in high-risk social sector environments and identify how to adapt their technical expertise to resource constrained and non-technical settings. They should anticipate diving into the intricacies of protecting largely under-resourced organizations and gaining exposure to tools needed to manage risk in complex political, sociological, legal, and ethical contexts. In the clinic, students work in teams supervised by Clinic staff to provide direct cybersecurity assistance to social sector organizations, with an emphasis on pragmatic, workable solutions that account for the unique needs of each partner. We welcome applications from curious students and cybersecurity practitioners who may have never considered applying their skills in this way, but want to make an impact!

CYBER 289 meets live (synchronously) twice a week via Zoom. Consult classes.berkeley.edu for class meeting times.


Prerequisites

Only students in the MICS degree program may enroll in CYBER 289. Students in other programs should enroll in INFO 289.

MICS students must have completed at least one semester of classes (CYBER 200 and CYBER 206 or 202) before participating in the UC Berkeley Cybersecurity Clinic.


Enrollment

Enrollment is by application; please submit the online application below to apply for course enrollment.

Enrollment Notes

  • Students must attend the first class.
  • No drops after enrollment in the class, other than for exceptional reasons. Because client teams will be formed at the start of the course, students accepted into the class are expected to participate in the course.
  • Students will be required to agree to the Cybersecurity Clinic Student Code of Conduct, including security, confidentiality, professionalism, and conflict of interest requirements. Before applying you may wish to review the Cybersecurity Clinic Student Code of Conduct (PDF).
  • If you have an active security clearance or work for the government or a government entity, please contact cybersecurityclinic@ischool.berkeley.edu after applying.

Questions

Please contact cybersecurityclinic@ischool.berkeley.edu if you have any questions about the clinic or the application process.


Fall 2026 Enrollment Application

Application deadlineJuly 2, 2026
Late deadlineJuly 7, 2026

Late applications will be reviewed depending on space availability.

About Me
First Term Registered
What was your first term enrolled in this degree program?
Expected Graduation Term
What do you expect to be your final semester before graduation?
I am applying for
Resume
One file only.
2 MB limit.
Allowed types: pdf.
Cover Letter

Please upload a cover letter (maximum one page, PDF format). Include:

  1. Why you want to take this course; and
  2. How you might apply your prior experience, skills, or past coursework to protect politically vulnerable organizations. (Background about CLTC’s approach to defending politically vulnerable organizations online)

Share with us your experience, skills, passions, or course of study that may be valuable to the interdisciplinary work of the Cybersecurity Clinic (e.g., cybersecurity, technology, human rights, law, policy, foreign language, community organization capacity building, or other applicable areas).

One file only.
2 MB limit.
Allowed types: pdf.
Security Keys

Students who enroll in the course will be sent a Google Titan security key — a small USB device for multi-factor authentication.

Titan Security Keys are available for both USB-A and USB-C connections. We need to know what kind of USB connection(s) your computer has, so that we can provide you the appropriate model of key.

USB-A
(A larger connection with square corners; must be inserted right-side-up; available in many Windows computers)
USB-C
(A smaller connection with rounded ends; can be inserted either side up; available in most new Mac computers)
Diagram of a USB-A connector and connectionDiagram of a USB-C connector and connection
(If your computer has both, we will provide you a USB-C key.)
To what address should we send that YubiKey?
CAPTCHA
Last updated: April 13, 2026