The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.

Courtlyn
Promotion and Events SpecialistTBD
8 weeks, online
15–20 hours per week
Our participants tell us that taking this program together with their colleagues helps to share common language and accelerate impact.
We hope you find the same. Special pricing is available for groups.
The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.
Courtlyn
Promotion and Events SpecialistBased on the information you provided, your team is eligible for a special discount, for Cybersecurity: Identity and Access Management starting on TBD .
We’ve sent you an email with enrollment next steps. If you’re ready to enroll now, click the button below.
Have questions? Email us at group-enrollments@emeritus.org.wants you to join them in Cybersecurity: Identity and Access Management.
To get started, please complete the information form on the following page.
OkayInterested in exploring other MIT xPRO programs? Learn more >
The increasing threat of complex cyberattacks puts global business and urban infrastructure networks at constant risk of data breaches and catastrophic failure. That's why more and more companies and government agencies are seeking to hire IT professionals with the specialized technical skills needed to analyze risk and defend mission-critical computer systems, networks, cloud applications, urban infrastructure, and more against cyberattacks.
This is your opportunity to learn the fundamental concepts of cybersecurity and acquire the core skill set that so many employers seek. Enroll today in MIT xPRO's Cybersecurity: Identity and Access Management program. This program provides an overview of concepts, strategies, and skills to protect enterprise computer systems against cyberattacks. It features personalized feedback from learning facilitators as well as assignments that help you develop your newly gained cybersecurity skills.
Gain in-demand cybersecurity skills and advance your career prospects with MIT xPRO's Cybersecurity: Identity and Access Management program.
Average annual salary range for entry-level security engineers in the US
Projected 5-year growth in demand for IT professionals with cybersecurity risk management skills, including NIST Cyber Security Framework, FedRAMP, and Cybersecurity Assessment
Annual projected growth in cybersecurity jobs in the US through 2029, over seven times faster job growth than the average of 4%
This program is a career accelerator for those who want to learn the fundamentals of cybersecurity engineering.
Build a foundation
Expand your knowledge
Apply your learnings
A certificate from MIT xPRO that recognizes your skills and success
Insights and case studies from renowned MIT faculty
Market-ready cybersecurity skills in a high-growth market
Learn about the National Institute of Standards and Technology Framework
Case studies on the mitigation of actual cyberattacks on US enterprises
Assignments and a final project to demonstrate your understanding of cybersecurity
Gain an overview of cybersecurity risk management and discuss its three facets: protect, detect, and respond.
Explore basic concepts, design, and architecture of computer security systems and their operation.
Review and gain understanding of the multiple laws that regulate cybersecurity and the different levels of protection they provide.
Explore the cyber threat landscape, identify the types of threats and vulnerabilities, and understand how they can affect businesses and people's everyday lives.
Analyze the federal government's responses to cyberattacks in cities.
Identify and analyze fundamental principles and concepts of IAM and best practices for identification, authentication, and authorization to allow access to computer systems and data resources.
Gain deeper knowledge of IAM best practices by exploring perspectives on administration and technology, layers and practices, the benefits of single sign-on, and federated identity management.
Become familiar with the various job responsibilities of an IAM analyst.
Gain an overview of cybersecurity risk management and discuss its three facets: protect, detect, and respond.
Analyze the federal government's responses to cyberattacks in cities.
Explore basic concepts, design, and architecture of computer security systems and their operation.
Identify and analyze fundamental principles and concepts of IAM and best practices for identification, authentication, and authorization to allow access to computer systems and data resources.
Review and gain understanding of the multiple laws that regulate cybersecurity and the different levels of protection they provide.
Gain deeper knowledge of IAM best practices by exploring perspectives on administration and technology, layers and practices, the benefits of single sign-on, and federated identity management.
Explore the cyber threat landscape, identify the types of threats and vulnerabilities, and understand how they can affect businesses and people's everyday lives.
Become familiar with the various job responsibilities of an IAM analyst.
![]()
Keri Pearlson
Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management
Dr. Pearlson is the executive director of cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3 at the MIT Sloan School of Management. Dr. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's Research Board, CSC, and AT&T. She founded KP Partners, a CIO advisory services firm and the IT Leaders' Forum, a community of next generation IT executives. She is the founding director of the Analytics Leadership Consortium at the International Institute of Analytics. She began her career at Hughes Aircraft Company as a systems analyst.
Dr. Pearlson's research spans MIS, business strategy, and organizational design. Her current research studies how organizations build a culture of cybersecurity and how organizations build trust to share mitigations for cyber breaches. Dr. Pearlson holds a Doctorate in business administration (DBA) in MIS from Harvard Business School, and an MS in industrial engineering and BS in mathematics from Stanford. She is the founding president of the Austin Society for Information Management (SIM) and was named "2014 National SIM Leader of the Year."
![]()
Nickolai Zeldovich
Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT
Dr. Zeldovich is a professor of electrical engineering and computer science at MIT, and a member of the Computer Science and Artificial Intelligence Laboratory. He received his PhD from Stanford University in 2008. His research interests are in building practical secure systems. Recent projects by Prof. Zeldovich and his students and colleagues include the CryptDB encrypted database, the STACK tool for finding undefined behavior bugs in C programs, the FSCQ formally verified file system, the Algorand cryptocurrency, and the Vuvuzela private messaging system.
Dr. Zeldovich has been involved with several start-up companies, including MokaFive (desktop virtualization), PreVeil (end-to-end encryption), and Algorand (cryptocurrency). Prof. Zeldovich's work has been recognized by "best paper" awards at the ACM SOSP conference, a Sloan fellowship (2010), an NSF CAREER award (2011), the MIT EECS Spira teaching award (2013), the MIT Edgerton faculty achievement award (2014), the ACM SIGOPS Mark Weiser award (2017), and an MIT EECS Faculty Research Innovation Fellowship (2018).
![]()
Danny Weitzner
3Com Founders Principal Research Scientist Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab
Prof. Weitzner is founding director of the MIT Internet Policy Research Initiative, principal research scientist at CSAIL, and a teacher of Internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of Accountable Systems to enable computational treatment of legal rules.
Prof. Weitzner was U.S. Deputy Chief Technology Officer for Internet Policy in the White House, where he led initiatives on privacy, cybersecurity, copyright, and digital trade policies promoting the free flow of information. He was responsible for the Obama Administration's Consumer Privacy Bill of Rights and the OECD Internet Policymaking Principles. He has a law degree from Buffalo Law School, and a B.A. in philosophy from Swarthmore College. His writings have appeared in Science, the Yale Law Review, Communications of the ACM, Washington Post, Wired Magazine and Social Research.
![]()
Stuart Madnick
John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)
Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity. His involvement in cybersecurity research goes back to 1979, when he coauthored the book Computer Security. Currently, he heads the Cybersecurity at MIT Sloan Initiative.
Dr. Madnick holds a Ph.D. in computer science from MIT and has been an MIT faculty member since 1972. He served as the head of MIT's Information Technologies Group in the Sloan School of Management for more than 20 years. He is the author or coauthor of more than 300 books, articles, and reports. Besides cybersecurity, his research interests include big data, semantic connectivity, database technology, software project management, and the strategic use of information technology.
![]()
Larry Susskind
Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School
Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making, the resolution of science-intensive policy disputes, renewable energy policy, water equity in older American cities, climate change adaptation, socially-responsible real estate development and the land claims of indigenous peoples.
Prof. Susskind is Director of the MIT Science Impact Collaborative. He is Founder of the Consensus Building Institute, a Cambridge-based not-for-profit company that provides mediation services in complex resource management disputes around the world. He also was one of the co-founders of the interuniversity Program on Negotiation at Harvard Law School, where he now directs the MIT-Harvard Public Disputes Program, serves as Vice Chair for Instruction, and leads PON's Master Classes in Negotiation. He is the recipient of ACSP's prestigious Educator of the Year Award and recipient of MIT's Award for Digital Instruction.
![]()
Barbara Johnson
Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)² Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI
Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for the government, automotive, entertainment, financial, and travel sectors. Her security, privacy, risk, and audit frameworks include ISO 27001, ISACA COBIT, NIST, HIPAA, and PCI. She brings global best practices into her client's enterprise security governance, policies and standards, architecture, and operations, inclusive of cryptography, incident response, and business continuity and disaster recovery. However, she tailors a security strategy to a client's industry and risk appetite.
Barbara enhances educational delivery as a security, audit, and compliance practitioner. Barbara is a Lecturer at MIT Sloan School of Management and a courseware developer for MIT xPRO Cyber Program. For (ISC)² CISSP and ISSMP: she develops courseware, teaches as a senior and lead instructor, speaks at Security Congress, and was Chair of (ISC)² Common Body of Knowledge. Furthermore, she imparts ISACA global best practices through its CISA, CISM, and CRISC certification classes. As a security educator, she has readied thousands of security professionals for certification exams.
Get recognized! Upon successful completion of this program, MIT xPRO awards participants a certificate of completion. This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.
Download BrochureAfter successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, in the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.