The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.
Courtlyn
Promotion and Events SpecialistTBD
8 weeks, online
15–20 hours per week
Our participants tell us that taking this program together with their colleagues helps to share common language and accelerate impact.
We hope you find the same. Special pricing is available for groups.
The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.
Courtlyn
Promotion and Events SpecialistThe increasing threat of complex cyberattacks puts global business and urban infrastructure networks at constant risk of data breaches and catastrophic failure. That's why more and more companies and government agencies are seeking to hire IT professionals with the specialized technical skills needed to analyze risk and defend mission-critical computer systems, networks, cloud applications, urban infrastructure, and more against cyberattacks.
This is your opportunity to learn the fundamental concepts of cybersecurity and acquire the core skill set that so many employers seek. Enroll today in MIT xPRO's Cybersecurity: Identity and Access Management program. This program provides an overview of concepts, strategies, and skills to protect enterprise computer systems against cyberattacks. It features personalized feedback from learning facilitators as well as assignments that help you develop your newly gained cybersecurity skills.
Gain in-demand cybersecurity skills and advance your career prospects with MIT xPRO's Cybersecurity: Identity and Access Management program.
Average annual salary range for entry-level security engineers in the US
Projected 5-year growth in demand for IT professionals with cybersecurity risk management skills, including NIST Cyber Security Framework, FedRAMP, and Cybersecurity Assessment
Annual projected growth in cybersecurity jobs in the US through 2029, over seven times faster job growth than the average of 4%
This program is a career accelerator for those who want to learn the fundamentals of cybersecurity engineering.
Build a foundation
Expand your knowledge
Apply your learnings
Gain an overview of cybersecurity risk management and discuss its three facets: protect, detect, and respond.
Explore basic concepts, design, and architecture of computer security systems and their operation.
Review and gain understanding of the multiple laws that regulate cybersecurity and the different levels of protection they provide.
Explore the cyber threat landscape, identify the types of threats and vulnerabilities, and understand how they can affect businesses and people's everyday lives.
Analyze the federal government's responses to cyberattacks in cities.
Identify and analyze fundamental principles and concepts of IAM and best practices for identification, authentication, and authorization to allow access to computer systems and data resources.
Gain deeper knowledge of IAM best practices by exploring perspectives on administration and technology, layers and practices, the benefits of single sign-on, and federated identity management.
Become familiar with the various job responsibilities of an IAM analyst.
Gain an overview of cybersecurity risk management and discuss its three facets: protect, detect, and respond.
Analyze the federal government's responses to cyberattacks in cities.
Explore basic concepts, design, and architecture of computer security systems and their operation.
Identify and analyze fundamental principles and concepts of IAM and best practices for identification, authentication, and authorization to allow access to computer systems and data resources.
Review and gain understanding of the multiple laws that regulate cybersecurity and the different levels of protection they provide.
Gain deeper knowledge of IAM best practices by exploring perspectives on administration and technology, layers and practices, the benefits of single sign-on, and federated identity management.
Explore the cyber threat landscape, identify the types of threats and vulnerabilities, and understand how they can affect businesses and people's everyday lives.
Become familiar with the various job responsibilities of an IAM analyst.
Get recognized! Upon successful completion of this program, MIT xPRO awards participants a certificate of completion. This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.
Download BrochureAfter successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, in the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.