Batch 17

Post Graduate Certificate in Cybersecurity

  • #1 Private University as per QS Global World Ranking 2025
  • Earn a certificate from MIT xPRO and 40 CEUs
  • Get hands on learning with IBM self-guided projects and certifications
  • Live masterclass on Gen AI and cybersecurity tools by industry experts
Work Experience

Invalid liquid data

Get a Headstart with a Personalized Tour. Watch this!

Watch this orientation video, as Dr. Keri Pearlson introduces your learning journey into core cybersecurity concepts, emerging technologies, and practical skills—preparing you for a high-demand, impactful career in the field.

MITxPRO Cybersecurity

    Program Highlights

    MIT x Pro PGCCY-IN-AYC-Icon-1

    Earn a certificate from MIT xPRO to elevate your credentials

    MIT x Pro PGCCY-IN-AYC-Icon-2

    Insights and case studies from renowned MIT faculty

    MIT x Pro PGCCY-IN-AYC-Icon-3

    Market-ready cybersecurity skills in a high-growth market

    MIT x Pro PGCCY-IN-AYC-Icon-4

    Capstone presentation project to share with potential employers

    MIT x Pro PGCCY-IN-AYC-Icon-5

    Access to cutting-edge tools and frameworks from MIT faculty

    MIT x Pro PGCCY-IN-AYC-Icon-6

    Bi-weekly doubt clearing session with program leader

    LP - MIT x Pro PGCCY.IN - Program Highlights - Icon-7 - Image

    Live Masterclasses with program leader for hands-on learning

    LP - MIT x Pro PGCCY.IN - Program Highlights - Icon-8 - Image

    Gain credentials from IBM courses and guided projects (optional)

    Program Frameworks

    MIT x Pro PGCCY-IN-PF-Icon-1
    National Institute of Standards and Technology (NIST) Framework

    The NIST CSF framework is threaded throughout the entire program as a commonly used framework. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

    MIT x Pro PGCCY-IN-PF-Icon-2
    Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

    The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the defensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.

    MIT x Pro PGCCY-IN-PF-Icon-3
    MITRE ATT&CK®

    The MITRE ATT&CK® knowledge base is explored deeper in the offensive and defensive pieces of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.

    Optional IBM Certifications

    IBM courses and guided projects are offered by Emeritus to help learners enhance their skills and knowledge in line with the latest industry trends and demands. These IBM courses and projects are entirely optional and do not impact the completion of the MIT xPRO course. Learners who complete them will receive an additional completion certificate from IBM and will have no bearing or relation with MIT xPRO program completion. The Emeritus team will support learners through IBM guided projects, which are separate from the MIT xPRO program content.

    Live Masterclasses with Program Leader

    LP - MIT x Pro PGCCY.IN - Masterclasses - 1 - Image

    Emerging cyber threats in Indian context

    LP - MIT x Pro PGCCY.IN - Masterclasses - 2 - Image

    How Generative AI can reduce cyber-crimes in organizations

    LP - MIT x Pro PGCCY.IN - Masterclasses - 3 - Image

    Live demo session on trending cybersecurity tools such as Burp Suite, Nmap, John The Ripper, Nessus essentials

    LP - MIT x Pro PGCCY.IN - Masterclasses - 4 - Image

    Preparing learners for CompTIA Pentest+ certification

    Tools Covered

    Note: The tools will be taught by teaching faculty, industry practitioners, or linked to relevant knowledge bases for your reference and self-guided learning.

    Case Studies

    solarwinds-logo

    The Solar Winds supply chain attack of 2020, which compromised several thousand Orion users

    saudi-aramco-logo

    The Saudi Aramco cyberattack of 2012 which wiped out 35000 computers and put the operations of the biggest oil company in the world at risk

    cisco-logo

    The Cisco debacle of 2018 where a Cisco engineer broke through the security of Cisco, accessed 456 virtual machines and deleted 16000 Webex accounts

    mirai-logo

    The MIRAI botnet attack of 2016, a severe DDOS attack which rendered much of the internet of the US east coast inaccessible

    verizon-media-logo

    A study of the cyberculture and best practices in Cybersecurity on Verizon media

    ukraine-logo

    The Ukraine PowerGrid attack of 2015 which blew power for 200000+ consumers for 1-6 hours in Ukraine

    city-of-baltimore-logo

    The Baltimore ransomware attack of 2019 where Baltimore city was attacked by the aggressive ransomware RobbinHood costing more than $18mn

    Who Is this Program for?

    Mid-level and Senior-level career professionals who have established their careers in information technology and are looking to improve their organization's preparedness and response against cyberattacks and grow their career as leaders in cybersecurity strategies will benefit most from this program.

    Additionally, graduates and early career professionals with or without prior experience in the IT field who want to specialize in cybersecurity from a globally recognized school and accelerate their career in a high-growth field with high-demand job opportunities will benefit from this program.

    The entire program has been an enriching and highly educational experience for me. I now feel confident in my understanding of cybersecurity. When I began, my knowledge was limited and pieced together...
    Saurav Kumar Pandey
    Manager - Technical Support
    Rackspace Technology
    The office hour sessions were incredibly impactful—gaining direct insights from seasoned industry experts significantly deepened my understanding and accelerated my growth in the field
    Pavan Kashyap
    SOC Analyst
    4XFast Technologies Pvt. Ltd.

    Program Modules

    Program Pillars

    Introduction to Cybersecurity-icon-1

    Pillar 1: Introduction to Cybersecurity

    The first three months of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and IAM (identity and access management).

    Defensive Cybersecurity - Icon-2

    Pillar 2: Defensive Cybersecurity

    The second set of three months focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.

    Offensive Cybersecurity - Icon-3

    Pillar 3: Offensive Cybersecurity

    The next set of months address the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.

    Program Faculty

    KERI PEARLSON-faculty
    KERI PEARLSON

    Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

    Dr. Pearlson is the executive director of Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has ...

    NICKOLAI ZELDOVICH-faculty
    NICKOLAI ZELDOVICH

    Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

    Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his...

    DANIEL J. WEITZNER-faculty
    DANIEL J. WEITZNER

    3Com Founders Principal Research Scientist, Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

    Daniel Weitzner is the founding director of the MIT Internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public poli...

    STUART MADNICK-Faculty
    STUART MADNICK

    John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

    Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT ...

    LARRY SUSSKIND-faculty
    LARRY SUSSKIND

    Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

    Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cyberse...

    UNA-MAY O-REILLY-faculty
    UNA-MAY O'REILLY

    Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL

    Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, ad...

    BARBARA JOHNSON-faculty
    BARBARA JOHNSON

    Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management

    Securing information systems is Barbara's purpose and educating security professionals is her passion.

    Barbara Johnson is a Senior Security, Audit and Compliance Management C...

    RAJIV SHRIDHAR-faculty
    RAJIV SHRIDHAR

    Information Security Officer and Director of Research Computing, MIT Sloan School of Management

    Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Slo...

    HOWARD SHROBE-faculty
    HOWARD SHROBE

    Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts

    Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambrid...

    Program Leaders

    Golam Azam - Program Mentor
    Golam Azam

    Next-Generation Cybersecurity Leader - United Airlines, PwC, CNBC / NBCUniversal, 7Eleven, US Presidential Election Security (NDIT), AIG Founder of Israel Technologies Inc. Sr. Consultant - PaloAlto Networks

    Golam Azam commands 15 plus years of core experienced versatile Cybersecurity Leadership, Teacher, Architect, Writer & Mentor with Executive MBA and outstanding Computer Engin...

    Ravish Jhala - Program Mentor
    Ravish Jhala

    Chief Executive Officer - VCNS Global

    Ravish is a seasoned IT professional with over two decades of experience in enabling technology for businesses. His career spans roles with leading brands such as Hyatt, Obero...

    Program Certificate

    Program Certificate

    • Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants and 40 Continuing Education Units (CEUs). This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

    • After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, with the name you used when registering for the program.

    • *Participants who opt and complete IMB courses will receive IBM certifications. These will be additional certificates and will have no bearing or relation with MIT xPRO program completion.

    Note: All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

    Registration for this program is done through Emeritus. You can contact us at mit.xpro@emeritus.org

    This program is open for enrolments for residents of India, Bangladesh, Bhutan, Myanmar, Nepal, Pakistan, Sri Lanka, Philippines, Indonesia, Thailand, Vietnam and Malaysia only.

    Note:

    Learning facilitator details and office hour dates and timings are from previous batches. The learning facilitators may change for upcoming batches based on availability and the office hour timings and dates may be changed based on a mutually decided schedule between Emeritus and the Learning facilitator.

    *Mentioned timelines are tentative.

    The Learning Experience

    What is it like to learn with the learning collaborator, Emeritus?

    More than 300,000 professionals globally, across 200 countries, have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded. All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes, the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner during the course period the cost of which is already included in the overall Course fee of the course.

    A dedicated program support team is available 7 days a week to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.

    FAQs

    Early Registrations Are Encouraged. Seats Fill Up Quickly!

    Flexible payment options available.

    Starts On