Cybersecurity: Identity and Access Management

Download Brochure

Get Your Brochure

Course Dates

STARTS ON

TBD

Course Duration

DURATION

8 weeks, online
15–20 hours per week

Course Fee
Course Fee

For Your Team

Enroll your team and learn with your peers

Learn More

Learn Foundational Cybersecurity Skills With MIT xPRO

The increasing threat of complex cyberattacks puts global business and urban infrastructure networks at constant risk of data breaches and catastrophic failure. That's why more and more companies and government agencies are seeking to hire IT professionals with the specialized technical skills needed to analyze risk and defend mission-critical computer systems, networks, cloud applications, urban infrastructure, and more against cyberattacks.

This is your opportunity to learn the fundamental concepts of cybersecurity and acquire the core skill set that so many employers seek. Enroll today in MIT xPRO's Cybersecurity: Identity and Access Management program. This program provides an overview of concepts, strategies, and skills to protect enterprise computer systems against cyberattacks. It features personalized feedback from learning facilitators as well as assignments that help you develop your newly gained cybersecurity skills.

Gain in-demand cybersecurity skills and advance your career prospects with MIT xPRO's Cybersecurity: Identity and Access Management program.

USD 75,860 – 106,547

Average annual salary range for entry-level security engineers in the US

Source: Salary.com

+60%

Projected 5-year growth in demand for IT professionals with cybersecurity risk management skills, including NIST Cyber Security Framework, FedRAMP, and Cybersecurity Assessment

Source: Burning Glass

31%⬆

Annual projected growth in cybersecurity jobs in the US through 2029, over seven times faster job growth than the average of 4%

Source: US Bureau of Labor Statistics

Who Is This Program For?

This program is a career accelerator for those who want to learn the fundamentals of cybersecurity engineering.

  • Career Launchers: Early career professionals who have interest in cybersecurity, IT professionals, network engineers, systems administrators, and SOC analysts who want to gain new skills in cybersecurity and risk management as well as add value to their organization by strengthening defenses against cyberattacks.
  • Career Builders: IT project and engineering managers who want to improve their organizations' preparedness and response against cyberattacks as well as advance their careers as leaders in cybersecurity strategies.
  • Career Switchers: Mid- or later-career IT professionals who want to switch to cybersecurity as a specialty to recharge their careers and take advantage of the demand for cybersecurity talent in areas such as marketing, sales, human resources, and operations.

Key Takeaways

Build a foundation

  • Explore the basic concepts of computer security systems and their operation.
  • Learn how to identify and test vulnerabilities.
  • Identify the key components and sequences of cybersecurity frameworks.

Expand your knowledge

  • Gain knowledge of privacy laws, regulatory agencies, and security resources—and the types of protection they provide.
  • Analyze cybersecurity processes.
  • Gain real-world insights from current cybersecurity professionals.

Apply your learnings

  • Apply cybersecurity concepts to real organizations and cyberattack scenarios.
  • The National Institute of Standards and Technology (NIST) model to understand and explain risk management.

Program Highlights

Decorative image relating to text that follows

A certificate from MIT xPRO that recognizes your skills and success

Decorative image relating to text that follows

Insights and case studies from renowned MIT faculty

Decorative image relating to text that follows

Market-ready cybersecurity skills in a high-growth market

Decorative image relating to text that follows

Learn about the National Institute of Standards and Technology Framework

Decorative image relating to text that follows

Case studies on the mitigation of actual cyberattacks on US enterprises

Decorative image relating to text that follows

Assignments and a final project to demonstrate your understanding of cybersecurity

Program Topics

Module 1:

Introduction to Cybersecurity Risk Management

Gain an overview of cybersecurity risk management and discuss its three facets: protect, detect, and respond.

Module 2:

Cybersecurity Foundation Concepts

Explore basic concepts, design, and architecture of computer security systems and their operation.

Module 3:

The Federal Government's Role in Law, Operations, and Standards

Review and gain understanding of the multiple laws that regulate cybersecurity and the different levels of protection they provide.

Module 4:

Threats and Vulnerabilities

Explore the cyber threat landscape, identify the types of threats and vulnerabilities, and understand how they can affect businesses and people's everyday lives.

Module 5:

Cybersecurity for Critical Urban Infrastructure

Analyze the federal government's responses to cyberattacks in cities.

Module 6:

IAM Concepts

Identify and analyze fundamental principles and concepts of IAM and best practices for identification, authentication, and authorization to allow access to computer systems and data resources.

Module 7:

IAM Layers and Technology

Gain deeper knowledge of IAM best practices by exploring perspectives on administration and technology, layers and practices, the benefits of single sign-on, and federated identity management.

Module 8:

Taking a Job in Cybersecurity Risk Management

Become familiar with the various job responsibilities of an IAM analyst.

Module 1:

Introduction to Cybersecurity Risk Management

Gain an overview of cybersecurity risk management and discuss its three facets: protect, detect, and respond.

Module 5:

Cybersecurity for Critical Urban Infrastructure

Analyze the federal government's responses to cyberattacks in cities.

Module 2:

Cybersecurity Foundation Concepts

Explore basic concepts, design, and architecture of computer security systems and their operation.

Module 6:

IAM Concepts

Identify and analyze fundamental principles and concepts of IAM and best practices for identification, authentication, and authorization to allow access to computer systems and data resources.

Module 3:

The Federal Government's Role in Law, Operations, and Standards

Review and gain understanding of the multiple laws that regulate cybersecurity and the different levels of protection they provide.

Module 7:

IAM Layers and Technology

Gain deeper knowledge of IAM best practices by exploring perspectives on administration and technology, layers and practices, the benefits of single sign-on, and federated identity management.

Module 4:

Threats and Vulnerabilities

Explore the cyber threat landscape, identify the types of threats and vulnerabilities, and understand how they can affect businesses and people's everyday lives.

Module 8:

Taking a Job in Cybersecurity Risk Management

Become familiar with the various job responsibilities of an IAM analyst.

Download Brochure

Program Instructors

Faculty Member Keri Pearlson

Keri Pearlson

Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3 at the MIT Sloan School of Management. Dr. Pearlson has held positions in academia and industry, including Babson College... More info

Faculty Member Nickolai Zeldovich

Nickolai Zeldovich

Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT, and a member of the Computer Science and Artificial Intelligence Laboratory. He received his PhD from Stanford University in 2008. His research interests are in building practical secure systems... More info

Faculty Member Danny Weitzner

Danny Weitzner

3Com Founders Principal Research Scientist Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Prof. Weitzner is founding director of the MIT Internet Policy Research Initiative, principal research scientist at CSAIL, and a teacher of Internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of Accountable Systems to enable computational treatment of legal rules... More info

Faculty Member Stuart Madnick

Stuart Madnick

John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity. His involvement in cybersecurity... More info

Faculty Member Larry Susskind

Larry Susskind

Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making, the resolution of science-intensive... More info

Faculty Member Barbara Johnson

Barbara Johnson

Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)² Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI

Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for the government, automotive, entertainment, financial, and travel sectors. Her security, privacy, risk, and audit frameworks include... More info

Guest Speakers

Faculty Member Caren Shiozaki

Caren Shiozaki

EVP-CIO for TMST, Inc., New Mexico. Vice Chair for SIM National and Founder of the National Cybersecurity SIG

Caren Shiozaki is EVP-CIO for TMST, Inc, a mortgage company in Santa Fe, New Mexico. She is also a senior fellow with the DivIHN Center of Excellence for digital security and risk. Previously, she was CIO for a Dallas-based media company. She has worked internationally for Bank of America and American Express. Caren is chair emeritus for SIM's National Board and co-founder of the national Digital Risk SIG. She is board chair for the Santa Fe Alliance for Science and the Santa Fe Animal Shelter. She holds professional certifications in corporate governance and data privacy and is a certified e-discovery specialist. She holds a degree in genetics from UC Berkeley.

Faculty Member Erica Wilson

Erica Wilson

CISO for Cass Information Systems

Erica Wilson has over 20 years of IT experience, 18 of which are in the field of cybersecurity. Erica currently serves as the CISO for Cass Information Systems. She has responsibility for all aspects of the company’s cybersecurity program; including security strategy, policies & procedures, technologies, and training. In addition, Erica leads all aspects of technology risk management, including compliance with internal and regulatory controls, as well as the Business Continuity Program. Erica also has a passion for STEM education. Throughout her professional career, she has consistently identified ways to influence and encourage others in the community to explore opportunities to work in the field information technology and cybersecurity.

ION SANTOTOMAS

Lead Security Analyst at Schneider Electric

Ion is a diligent senior cybersecurity professional with a strong technical background in systems engineering and infrastructure management. Ion is passionate about both offensive and defensive aspects of cybersecurity and actively participates in events, conferences, and online challenges to sharpen his technical skills and knowledge about the latest trends and attack vectors in order to become a better defender.

Faculty Member

DANIEL GORECKI

Group Information Security Manager & CISO at Ascot Group

Daniel Gorecki is a Group Information Security Manager and CISO at Ascot Group. In this role he manages a global team for information risk management and cyber resiliency for the global organization. Prior to joining Ascot Group, he was the CISO at Aramark and held the CISO and CIO roles at Intercept Pharmaceuticals. Dan maintains the certification for Certified Information Systems Security Professional (CISSP), Certified Data Privacy Solutions Engineer (CDPSE), has completed SIM's Regional Leadership Forum for IT Executives, and holds a B.E. in Computer Engineering from Stony Brook University.

Certificate

Example image of certificate that will be awarded after successful completion of this program

Certificate

Get recognized! Upon successful completion of this program, MIT xPRO awards participants a certificate of completion. This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

Download Brochure

After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, in the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

Registration for this program is through Emeritus. You can contact us at mit@emeritus.org
Apply Now

Early registrations are encouraged. Seats fill up quickly!