INFO 289: More Information and Application

Course Description

For individuals and organizations involved in community work, human‑rights advocacy, and political activism, cybersecurity threats are an increasingly common reality of operating in the digital world. The social sector has long been targeted by ideological, political, and governmental opponents, and the widespread adoption of connected technologies by the social sector has created a new class of vulnerabilities.

Similar to university clinics in law and medicine, the UC Berkeley Cybersecurity Clinic trains interdisciplinary teams of students to support social sector organizations in bolstering their security so they can defend themselves against digital threats. The Clinic provides students with real-world experience assisting politically vulnerable organizations and persons around the world to develop and implement sound cybersecurity practices. 

More information about the UC Berkeley Cybersecurity Clinic


Class Structure

The class is made up of a classroom component and clinic component. In the first half of the semester, students study the basic theories and practices of digital security, the intricacies of protecting largely under-resourced organizations, and tools needed to manage risk in complex political, sociological, legal, and ethical contexts in class. Weekly lectures provide students with the background information and tools they need to engage with clients, and coursework focuses on client-facing deliverables such as risk assessments and policies. 

During the clinic component, students work in teams supervised by Clinic staff to provide direct cybersecurity assistance to social sector organizations, including learning about a client’s mission and context, assessing its vulnerabilities, and recommending and implementing mitigations to identified security risks. The emphasis is on pragmatic, workable solutions that reflect the unique operational needs of each client organization. Towards the end of the semester, students should expect to work an average of 6–-8 hours per week (including class time), with workload fluctuating based on client availability and needs.


Prerequisites

No course prerequisites or previous technical experience are required

Students from all disciplines are encouraged to apply; in the past, students have had backgrounds grounded in technology, law, policy, cybersecurity, and foreign languages.

The key to success in the class is interdisciplinary collaboration, clear communication, and an understanding of how technology shapes and sometimes harms people’s lives.

(MICS students may not enroll in INFO 289; they should register for CYBER 289 instead.)


Enrollment

Enrollment is by application and is limited to graduate students and exceptional upper-level undergraduate students. Please submit the online application below to apply for course enrollment.

Enrollment Notes

  • Students must attend the first class.
  • INFO 289 may be repeated for credit. Repeat students will follow a different syllabus.
  • No drops after enrollment in the class, other than for exceptional reasons. Because client teams will be formed at the start of the course, students accepted into the class are expected to participate in the course.
  • Students will be required to agree to the Cybersecurity Clinic Student Code of Conduct, including security, confidentiality, professionalism, and conflict of interest requirements. Before applying you may wish to review the Cybersecurity Clinic Student Code of Conduct (PDF).
  • If you have an active security clearance or work for the government or a government entity, please contact cybersecurityclinic@ischool.berkeley.edu after applying.

Questions

Please contact cybersecurityclinic@ischool.berkeley.edu if you have any questions about the clinic or the application process.


Fall 2026 Enrollment Application

Priority deadlineJune 30, 2026
Priority deadline for MIMS studentsJuly 22, 2026
DeadlineAugust 26, 2026

Applications received after the priority deadline will be reviewed depending on space availability.

About Me
Degree Program
First Term Registered
What was your first term enrolled in this degree program?
Expected Graduation Term
What do you expect to be your final semester before graduation?
I am applying for
Resume
One file only.
2 MB limit.
Allowed types: pdf.
Cover Letter

Please upload a cover letter (maximum one page, PDF format). Include:

  1. Why you want to take this course; and
  2. How you might apply your prior experience, skills, or past coursework to protect politically vulnerable organizations. (Background about CLTC’s approach to defending politically vulnerable organizations online)

Share with us your experience, skills, passions, or course of study that may be valuable to the interdisciplinary work of the Cybersecurity Clinic (e.g., cybersecurity, technology, human rights, law, policy, foreign language, community organization capacity building, or other applicable areas).

One file only.
2 MB limit.
Allowed types: pdf.
Security Keys

Students who enroll in the course will receive a Google Titan security key — a small USB device for multi-factor authentication.

Titan Security Keys are available for both USB-A and USB-C connections. We need to know what kind of USB connection(s) your computer has, so that we can provide you the appropriate model of key.

USB-A
(A larger connection with square corners; must be inserted right-side-up; available in many Windows computers)
USB-C
(A smaller connection with rounded ends; can be inserted either side up; available in most new Mac computers)
Diagram of a USB-A connector and connectionDiagram of a USB-C connector and connection
(If your computer has both, we will provide you a USB-C key.)
CAPTCHA
Last updated: March 11, 2026