Post Graduate Certificate in Cybersecurity

Assess risk, improve defenses, and make your organization cyber resilient with the MIT xPRO edge

Get Your Brochure

Course Dates

STARTS ON

December 20, 2021

Course Duration

DURATION

10 Months Online
10-12 hours per week

Course Duration

EMIs as low as INR 6,114/ month*.
Learn more

This program is open for enrollments for participants from India, Bangladesh, Bhutan, Burma, Nepal, Pakistan, and Sri Lanka only.

Apply before November 30, 2021 and avail an early bird tuition assistance of US$350. Use code MITXPRO350EBTA during payment.

Program Overview

Cyberattacks are becoming more frequent, complex, and targeted, collectively costing organizations billions of dollars every year. To put this in perspective, a recent report by IBM states that India reported the second-highest number of cyberattacks in the Asia-Pacific region (The Economic Times, 2021). No wonder across industries there is a surging demand for cybersecurity specialists with technical expertise to defend mission-critical computer systems, networks, and cloud applications against growing cyberattacks.

Enroll today in the MIT xPRO Post Graduate Certificate in Cybersecurity program, which focuses on the defensive and offensive aspects of the technology. It also includes personalized feedback from program leaders, insights from guest speakers, career coaching, mentorship, and the opportunity to create a capstone network development project for a job portfolio.

32%

Indian organizations said that they experienced more cyber attacks in 2021 than the year before.

SOURCE: STATE OF CYBERSECURITY, ISACA, 2021

3.5 Million

Estimated cybersecurity job opportunities in India by the end of 2021.

SOURCE: BUSINESS STANDARD, 2021

Who Is this Program for?

Mid and senior career professionals who have established their careers in information technology and are looking to improve their organization's preparedness and response against cyberattacks and grow their career as leaders in cybersecurity strategies will benefit most from this program.

Additionally, graduates and early career professionals with or without prior experience in the IT field who want to specialize in cybersecurity from a globally recognized school and accelerate their career in a high-growth field with high-demand job opportunities will benefit from this program.

Program Frameworks

National Institute of Standards and Technology (NIST) Framework

The NIST CSF framework is threaded throughout the entire program as a commonly used framework. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the defensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.

MITRE ATT&CK®

The MITRE ATT&CK® knowledge base is explored deeper in the offensive and defensive pieces of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.

Program Highlights

A certificate from MIT xPRO to recognize your skills and success

Insights and case studies from renowned MIT faculty

Market-ready cybersecurity skills in a high-growth market

Capstone presentation project to share with potential employers

A great start towards a degree or certification in cybersecurity

The knowledge to obtain an entry-level position in cybersecurity

Section Summaries

Section 1: Introduction to Cybersecurity

The first three months of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and IAM (identity and access management).

Section 2: Defensive Cybersecurity

The second set of three months focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.

Section 3: Offensive Cybersecurity

The next set of three months address the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.

Program Topics

This program is organized into three main sections: Introduction to Cybersecurity, Defensive Cybersecurity, and Offensive Cybersecurity. Whether you are just starting your IT career or expanding into a new specialty, this comprehensive program will equip you with the skills needed to excel in the field of cybersecurity. This program includes the following modules:

Module 1:

Introduction to Cybersecurity Risk Management

Module 2:

Cybersecurity Foundation Concepts

Module 3:

Federal Government Role: Law, Operations, and Standards

Module 4:

Threats and Vulnerabilities

Module 5:

Cybersecurity for Critical Urban Infrastructure

Module 6:

Identity and Access Management (IAM) Concepts

Module 7:

IAM Layers and Technology

Module 8:

Preparing for a Job in Cybersecurity Risk Management

Module 9:

Introduction to Defensive Cybersecurity

Module 10:

Cryptography

Module 11:

Security Operations Center (SOC)

Module 12:

Incident Response (IR)

Module 13:

Secure Systems Administration

Module 14:

Secure Network Administration

Module 15:

Cloud Security

Module 16:

Preparing for a Job in Cybersecurity Operations

Module 17:

Introduction to Offensive Cybersecurity

Module 18:

Penetration Testing Part 1

Module 19:

Penetration Testing Part 2

Module 20:

Social Engineering

Module 21:

Artificial Intelligence

Module 22:

Policy and Privacy, Regulation, and Data Governance

Module 23:

OT and IoT Risk

Module 24:

Preparing for a Job in Offensive Cybersecurity Operations

Module 1:

Introduction to Cybersecurity Risk Management

Module 13:

Secure Systems Administration

Module 2:

Cybersecurity Foundation Concepts

Module 14:

Secure Network Administration

Module 3:

Federal Government Role: Law, Operations, and Standards

Module 15:

Cloud Security

Module 4:

Threats and Vulnerabilities

Module 16:

Preparing for a Job in Cybersecurity Operations

Module 5:

Cybersecurity for Critical Urban Infrastructure

Module 17:

Introduction to Offensive Cybersecurity

Module 6:

Identity and Access Management (IAM) Concepts

Module 18:

Penetration Testing Part 1

Module 7:

IAM Layers and Technology

Module 19:

Penetration Testing Part 2

Module 8:

Preparing for a Job in Cybersecurity Risk Management

Module 20:

Social Engineering

Module 9:

Introduction to Defensive Cybersecurity

Module 21:

Artificial Intelligence

Module 10:

Cryptography

Module 22:

Policy and Privacy, Regulation, and Data Governance

Module 11:

Security Operations Center (SOC)

Module 23:

OT and IoT Risk

Module 12:

Incident Response (IR)

Module 24:

Preparing for a Job in Offensive Cybersecurity Operations
Download Brochure

Career Preparation and Guidance*

Stepping into a career in cybersecurity requires a variety of job-ready skills, both hard and soft. This program guides you in navigating a career path, starting from personalized mentorship sessions to job placement assistance while developing your technical expertise to gain an edge over your peers. These services are provided by Emeritus, our learning collaborator for this program. The program support team includes program leaders who help you reach your learning goals and career coaches to guide you through your job search. The primary goal is to give you the skills needed to be prepared for a job in this field; however, job placement is not guaranteed.

Emeritus provides the following career preparation services:

  • 1:1 Mentorship Sessions by an Emeritus Career Coach
  • Resume Building Group Workshops
  • LinkedIn Profile Building Group Workshops
  • Interview Preparation Group Workshops
  • 1:1 Mock Interviews by Industry Experts
  • Access to Emeritus' Career Services Job Portal
  • Participation in Career Fairs
  • Job Placement Assistance**

*Available to Indian residents only.

**Job placement assistance from partner companies are published, applied to, and tracked to success via an online platform – offered in partnership with Superset.

Program Faculty

Faculty Member KERI PEARLSON

KERI PEARLSON

Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's... More info

NICKOLAI ZELDOVICH

Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008. His research interests are in building practical secure systems. Recent projects... More info

Faculty Member DANNY WEITZNER

DANIEL J. WEITZNER

3Com Founders Principal Research Scientist, Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Daniel Weitzner is the founding director of the MIT Internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of... More info

STUART MADNICK

John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity. His involvement... More info

LARRY SUSSKIND

Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making... More info

UNA-MAY O'REILLY

Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL

Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting... More info

Faculty Member BARBARA JOHNSON

BARBARA JOHNSON

Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)2 Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI

Securing information systems is Barbara’s purpose and educating security professionals is her passion. Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for... More info

RAJIV SHRIDHAR

Information Security Officer and Director of Research Computing, MIT Sloan School of Management

Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students, and collaborators by providing specialized computing infrastructure, datasets, software... More info

Faculty Member HOWARD SHROBE

HOWARD SHROBE

Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts

Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL... More info

Program Certificate

Program Certificate

Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants. This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

Download Brochure

After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, with the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

Financing Options* Starting at INR 6,114/ Month.

Option 1

Program Fee: INR 2,62,000
Maximum Loan Amount: INR 2,62,000
Tenure (months): 36
EMI/ month: INR 8,769

Option 2

Program Fee: INR 2,62,000
Maximum Loan Amount: INR 2,62,000
Tenure (months): 48
EMI/ month: INR 7,055

Option 3

Program Fee: INR 2,62,000
Maximum Loan Amount: INR 2,62,000
Tenure (months): 60
EMI/ month: INR 6,114

Also available in 12/ 18/ 24 months EMI plans.


Note:
The above EMI's are indicative and figures in INR are approx.
The EMI's offered by each of the loan providers might vary from the above figures, depending upon tenure and loan amount to be disbursed.
Our Program Advisors will help you with information on how to avail a loan from our loan providers.
*Applicable only for Indian residents.
Registration for this program is done through Emeritus. You can contact us at mit.xpro@emeritus.org
Apply Now

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available. Learn more.