Batch 16

Post Graduate Certificate in Cybersecurity

  • #1 Private University as per QS Global World Ranking 2025
  • Earn a certificate from MIT xPRO and 40 CEUs
  • Get hands on learning with IBM self-guided projects and certifications
  • Live masterclass on Gen AI and cybersecurity tools by industry experts
Country/Region
Work Experience

Program Overview

Cybersecurity as a career requires thinking quickly and strategically to ward off data breaches and network takeovers. It entails a strategic cat-and-mouse game of ever-changing defensive and offensive techniques. As a cybersecurity specialist on the frontline protecting enterprise IT networks and other critical internet-based information systems against cyberattacks, you have to decide which approach to apply when. This is what joining the Post Graduate Certificate in Cybersecurity from MIT xPRO will teach you while developing your capability and giving your resume the MIT xPRO advantage! It's an immersive certificate program that will provide you with a comprehensive introduction to cybersecurity focused on the defensive and offensive aspects of technology. You will also benefit from receiving personalized feedback from program leaders, insights from guest speakers, career coaching, mentorship from leading faculty who are thought leaders in the field, and the opportunity to create a capstone network development project for a job portfolio.

Program Highlights

MIT x Pro PGCCY-IN-AYC-Icon-1

Earn a certificate from MIT xPRO to elevate your credentials

MIT x Pro PGCCY-IN-AYC-Icon-2

Insights and case studies from renowned MIT faculty

MIT x Pro PGCCY-IN-AYC-Icon-3

Market-ready cybersecurity skills in a high-growth market

MIT x Pro PGCCY-IN-AYC-Icon-4

Capstone presentation project to share with potential employers

MIT x Pro PGCCY-IN-AYC-Icon-5

Access to cutting-edge tools and frameworks from MIT

MIT x Pro PGCCY-IN-AYC-Icon-6

Bi-weekly doubt clearing session with learning facilitators

Program Frameworks

MIT x Pro PGCCY-IN-PF-Icon-1
National Institute of Standards and Technology (NIST) Framework

The NIST CSF framework is threaded throughout the entire program as a commonly used framework. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

MIT x Pro PGCCY-IN-PF-Icon-2
Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the defensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.

MIT x Pro PGCCY-IN-PF-Icon-3
MITRE ATT&CK®

The MITRE ATT&CK® knowledge base is explored deeper in the offensive and defensive pieces of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.

Gain Credentials from IBM Certifications

Live Masterclasses with Program Leader

LP - MIT x Pro PGCCY.IN - Masterclasses - 1 - Image

Emerging cyber threats in Indian context

LP - MIT x Pro PGCCY.IN - Masterclasses - 2 - Image

How Generative AI can reduce cyber-crimes in organizations

LP - MIT x Pro PGCCY.IN - Masterclasses - 3 - Image

Live demo session on trending cybersecurity tools such as Burp Suite, Nmap, John The Ripper, Nessus essentials

LP - MIT x Pro PGCCY.IN - Masterclasses - 4 - Image

Preparing learners for CompTIA Pentest+ certification

Tools Covered

Note: The tools will be taught by teaching faculty, industry practitioners, or linked to relevant knowledge bases for your reference and self-guided learning.

Case Studies

solarwinds-logo

The Solar Winds supply chain attack of 2020, which compromised several thousand Orion users

saudi-aramco-logo

The Saudi Aramco cyberattack of 2012 which wiped out 35000 computers and put the operations of the biggest oil company in the world at risk

cisco-logo

The Cisco debacle of 2018 where a Cisco engineer broke through the security of Cisco, accessed 456 virtual machines and deleted 16000 Webex accounts

mirai-logo

The MIRAI botnet attack of 2016, a severe DDOS attack which rendered much of the internet of the US east coast inaccessible

verizon-media-logo

A study of the cyberculture and best practices in Cybersecurity on Verizon media

ukraine-logo

The Ukraine PowerGrid attack of 2015 which blew power for 200000+ consumers for 1-6 hours in Ukraine

city-of-baltimore-logo

The Baltimore ransomware attack of 2019 where Baltimore city was attacked by the aggressive ransomware RobbinHood costing more than $18mn

Who Is this Program for?

Mid-level and Senior-level career professionals who have established their careers in information technology and are looking to improve their organization's preparedness and response against cyberattacks and grow their career as leaders in cybersecurity strategies will benefit most from this program.

Additionally, graduates and early career professionals with or without prior experience in the IT field who want to specialize in cybersecurity from a globally recognized school and accelerate their career in a high-growth field with high-demand job opportunities will benefit from this program.

Program Modules

  • Module 1: Introduction to Cybersecurity Risk Management

  • Module 2: Cybersecurity Foundation Concepts

  • Module 3: Federal Government’s Role: Laws, Operations, and Standards

  • Module 4: Threats and Vulnerabilities

  • Module 5: Cybersecurity and Critical Urban Infrastructure

  • Module 6: IAM(Identity Access Management) Concepts

  • Module 7: Layers of IAM and Technologies

  • Module 8: Preparing for a Job in Cybersecurity Risk Management

  • Module 9: Intro to Defensive Cybersecurity

  • Module 10: Cryptography

  • Module 11: Security Operations Centre

  • Module 12: Incident Response

  • Module 13: Secure Systems Administration

  • Module 14: Secure Network Administration

  • Module 15: Cloud Security

  • Module 16: Preparing for a Job in Cybersecurity Operations

  • Module 17: Intro to Offensive Cybersecurity

  • Module 18: Penetration Testing Part 1

  • Module 19: Penetration Testing Part 2

  • Module 20: Social Engineering

  • Module 21: Artificial Intelligence

  • Module 22: Policy and Privacy, Regulation, and Data Governance

  • Module 23: OT and IoT Risk

  • Module 24: Preparing for a Job in Offensive Cybersecurity Operations

Program Pillars

Introduction to Cybersecurity-icon-1

Pillar 1: Introduction to Cybersecurity

The first three months of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and IAM (identity and access management).

Defensive Cybersecurity - Icon-2

Pillar 2: Defensive Cybersecurity

The second set of three months focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.

Offensive Cybersecurity - Icon-3

Pillar 3: Offensive Cybersecurity

The next set of months address the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.

Program Faculty

KERI PEARLSON-faculty
KERI PEARLSON

Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has ...

NICKOLAI ZELDOVICH-faculty
NICKOLAI ZELDOVICH

Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his...

DANIEL J. WEITZNER-faculty
DANIEL J. WEITZNER

3Com Founders Principal Research Scientist, Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Daniel Weitzner is the founding director of the MIT Internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public poli...

STUART MADNICK-Faculty
STUART MADNICK

John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT ...

LARRY SUSSKIND-faculty
LARRY SUSSKIND

Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cyberse...

UNA-MAY O-REILLY-faculty
UNA-MAY O'REILLY

Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL

Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, ad...

BARBARA JOHNSON-faculty
BARBARA JOHNSON

Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management

Securing information systems is Barbara's purpose and educating security professionals is her passion.

Barbara Johnson is a Senior Security, Audit and Compliance Management C...

RAJIV SHRIDHAR-faculty
RAJIV SHRIDHAR

Information Security Officer and Director of Research Computing, MIT Sloan School of Management

Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Slo...

HOWARD SHROBE-faculty
HOWARD SHROBE

Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts

Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambrid...

Program Mentor & Learning Facilitators

Golam Azam - Program Mentor
Golam Azam

Next-Generation Cybersecurity Leader - United Airlines, PwC, CNBC / NBCUniversal, 7Eleven, US Presidential Election Security (NDIT), AIG Founder of Israel Technologies Inc. Sr. Consultant - PaloAlto Networks

Golam Azam commands 15 plus years of core experienced versatile Cybersecurity Leadership, Teacher, Architect, Writer & Mentor with Executive MBA and outstanding Computer Engin...

Ravish Jhala - Program Mentor
Ravish Jhala

Chief Executive Officer - VCNS Global

Ravish is a seasoned IT professional with over two decades of experience in enabling technology for businesses. His career spans roles with leading brands such as Hyatt, Obero...

Program Certificate

Program Certificate

Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants and 40 Continuing Education Units (CEUs). This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, with the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

Registration for this program is done through Emeritus. You can contact us at mit.xpro@emeritus.org

This program is open for enrolments for residents of India, Bangladesh, Bhutan, Myanmar, Nepal, Pakistan, Sri Lanka, Philippines, Indonesia, Thailand, Vietnam and Malaysia only.

Note:

Learning facilitator details and office hour dates and timings are from previous batches. The learning facilitators may change for upcoming batches based on availability and the office hour timings and dates may be changed based on a mutually decided schedule between Emeritus and the Learning facilitator.

*Mentioned timelines are tentative.

The Learning Experience

What is it like to learn with the learning collaborator, Emeritus?

More than 300,000 professionals globally, across 200 countries, have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded. All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes, the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner during the course period the cost of which is already included in the overall Course fee of the course.

A dedicated program support team is available 7 days a week to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.

Early Registrations Are Encouraged. Seats Fill Up Quickly!

Flexible payment options available.

Starts On