The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.
Courtlyn
Promotion and Events SpecialistTBD
8 weeks, online
15–20 hours per week
Our participants tell us that taking this program together with their colleagues helps to share common language and accelerate impact.
We hope you find the same. Special pricing is available for groups.
The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.
Courtlyn
Promotion and Events SpecialistCyberattacks are on the rise globally and will only increase in frequency, complexity, and cost as technology proliferates. At the same time, a recent report by CyberEdge found that approximately 87% of organizations don’t have the skilled cybersecurity personnel needed to address these growing threats.
With MIT xPRO's Certificate in Cybersecurity Defense, you can begin or continue your career journey in cybersecurity and help fill this critical gap in expertise. As a participant in this 8-week course, you’ll get a comprehensive introduction to defensive cybersecurity that’s focused on core concepts such as cryptography, security operations center (SOC), incident response (IR), secure system and network administration, and cloud security. You’ll learn the fundamentals of secure communication between computer systems and organizations and how to identify and respond to cyberattacks. And you’ll be broadening your career opportunities in this rapidly expanding field as you work toward entry-level positions such as SOC analyst.
Don't miss your chance to enhance your existing IT expertise or accelerate your career with in-demand cybersecurity skills.
Average annual salary for an SOC analyst
The average cost of a single data breach
The percentage of organizations boosting their cybersecurity budgets in 2021 due to increased threats
Build a foundation
Expand your knowledge
Apply your learning
Gain an understanding of the repercussions of inadequate defensive security strategies. Learn how the NIST model applies to defensive strategy and get a detailed overview of the layers of defense as well as an introduction to cryptography and how it relates to security services.
Get a high-level overview of cryptography concepts, including an introduction to hash functions, message authentication codes (MAC), symmetric key encryption, the relationship between public and shared key encryption, and more.
Examine SOC models and their purposes, functions, and services. Understand the differences between reactive and proactive threat detection and research a variety of SOC tools and describe their functions, strengths/weaknesses, and administration.
Identify the key components and sequences of IR and describe the connections between IR and criminal digital forensics and disaster recovery. Explore the real-life challenges organizations face with IR plans and teams to help you be better prepared for a potential IR position.
Understand the role and responsibilities of systems administrators and how they are able to protect against security issues and confirm that their protection measures are successful.
Dive deeper into the topic of secure network administration, from learning the fundamentals to exploring different types of network filtering.
Analyze fundamental cloud security concepts and principles and explore the pros and cons of cloud-based services and other cloud service models. Get an introduction to the components of the CSA Cloud Controls Matrix.
Consider the job responsibilities of an SOC analyst's role. Learn how VPNs connect the concepts of cryptography and network authentication services and explore security issues that can arise within an organization. You’ll also have an opportunity to use soft and presentation skills through various learning activities during this final week.
Gain an understanding of the repercussions of inadequate defensive security strategies. Learn how the NIST model applies to defensive strategy and get a detailed overview of the layers of defense as well as an introduction to cryptography and how it relates to security services.
Understand the role and responsibilities of systems administrators and how they are able to protect against security issues and confirm that their protection measures are successful.
Get a high-level overview of cryptography concepts, including an introduction to hash functions, message authentication codes (MAC), symmetric key encryption, the relationship between public and shared key encryption, and more.
Dive deeper into the topic of secure network administration, from learning the fundamentals to exploring different types of network filtering.
Examine SOC models and their purposes, functions, and services. Understand the differences between reactive and proactive threat detection and research a variety of SOC tools and describe their functions, strengths/weaknesses, and administration.
Analyze fundamental cloud security concepts and principles and explore the pros and cons of cloud-based services and other cloud service models. Get an introduction to the components of the CSA Cloud Controls Matrix.
Identify the key components and sequences of IR and describe the connections between IR and criminal digital forensics and disaster recovery. Explore the real-life challenges organizations face with IR plans and teams to help you be better prepared for a potential IR position.
Consider the job responsibilities of an SOC analyst's role. Learn how VPNs connect the concepts of cryptography and network authentication services and explore security issues that can arise within an organization. You’ll also have an opportunity to use soft and presentation skills through various learning activities during this final week.
Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants. This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.
Download BrochureAfter successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, in the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.