Post Graduate Certificate in Cybersecurity

Mid- and Senior-level Professionals | No Prior Experience in IT Field Required | Learn from MIT faculty and gain the MIT xPRO edge

Get Your Brochure

Course Dates

STARTS ON

August 17, 2022

Course Duration

DURATION

10 Months, Online
10-12 hours per week

Course Fee

PROGRAM FEE

US$3,500 US$3,300 or get US$350 off with a referral

Course Information Flexible payment available

Application Details

Round 1

US$3,300 / program fee

Application Deadline
1
Round 2

US$3,500 / program fee

Application Deadline
2
Round 3

US$3,500 / program fee

Application Deadline
3
This programe is open for enrolments for residents of India, Bangladesh, Bhutan, Burma, Nepal, Pakistan, Sri Lanka, Philippines, Indonesia, Thailand, Vietnam and Malaysia only.

Application Deadline: July 21, 2022

EMIs as low as INR 6,114/ month.
Learn more

Apply before July 21, 2022 and avail a tuition assistance of USD 200.
Discount will be auto-applied during payment.

Industry Trends

80%

Spike in Cybercrime in Asia Pacific Regions in 2021

SOURCE: (GROUP IB REPORT 2022)

3.5 Million

Cybersecurity jobs to be available globally

SOURCE: CYBERSECURITY JOBS REPORT 2021

The Massachusetts Institute of Technology (MIT) xPRO Advantage

#1

Private University

QS WORLD RANKING 2022

98

Nobel Prize Laureates

26

Turing Award Winners

Program Certificate

Program Certificate

Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants. This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

Download Brochure

After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, with the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

Advance Your Career in Cybersecurity With MIT xPRO

A certificate from MIT xPRO to recognize your skills and success

Insights and case studies from renowned MIT faculty

Market-ready cybersecurity skills in a high-growth market

Capstone presentation project to share with potential employers

A great start towards a degree or certification in cybersecurity

The knowledge to obtain an entry-level position in cybersecurity

Who Is this Program for?

Mid and senior career professionals who have established their careers in information technology and are looking to improve their organization's preparedness and response against cyberattacks and grow their career as leaders in cybersecurity strategies will benefit most from this program.

Additionally, graduates and early career professionals with or without prior experience in the IT field who want to specialize in cybersecurity from a globally recognized school and accelerate their career in a high-growth field with high-demand job opportunities will benefit from this program.
Past Participant Profile

Past Participant Profile

Program Frameworks

National Institute of Standards and Technology (NIST) Framework

The NIST CSF framework is threaded throughout the entire program as a commonly used framework. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the def ensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.

MITRE ATT&CK®

The MITRE ATT&CK® knowledge base is explored deeper in the offensive and defensive pieces of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.

Section Summaries

Section 1: Introduction to Cybersecurity

The first three months of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and IAM (identity and access management).

Section 2: Defensive Cybersecurity

The second set of three months focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.

Section 3: Offensive Cybersecurity

The next set of months address the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.

Program Modules

Module 1:

Introduction to Cybersecurity Risk Management

Module 2:

Cybersecurity Foundation Concepts

Module 3:

Federal Government Role: Law, Operations, and Standards

Module 4:

Threats and Vulnerabilities

Module 5:

Cybersecurity for Critical Urban Infrastructure

Module 6:

Identity and Access Management (IAM) Concepts

Module 7:

IAM Layers and Technology

Module 8:

Preparing for a Job in Cybersecurity Risk Management

Module 9:

Introduction to Defensive Cybersecurity

Module 10:

Cryptography

Module 11:

Security Operations Center (SOC)

Module 12:

Incident Response (IR)

Module 13:

Secure Systems Administration

Module 14:

Secure Network Administration

Module 15:

Cloud Security

Module 16:

Preparing for a Job in Cybersecurity Operations

Module 17:

Introduction to Offensive Cybersecurity

Module 18:

Penetration Testing Part 1

Module 19:

Penetration Testing Part 2

Module 20:

Social Engineering

Module 21:

Artificial Intelligence

Module 22:

Policy and Privacy, Regulation, and Data Governance

Module 23:

OT and IoT Risk

Module 24:

Preparing for a Job in Offensive Cybersecurity Operations

Module 1:

Introduction to Cybersecurity Risk Management

Module 13:

Secure Systems Administration

Module 2:

Cybersecurity Foundation Concepts

Module 14:

Secure Network Administration

Module 3:

Federal Government Role: Law, Operations, and Standards

Module 15:

Cloud Security

Module 4:

Threats and Vulnerabilities

Module 16:

Preparing for a Job in Cybersecurity Operations

Module 5:

Cybersecurity for Critical Urban Infrastructure

Module 17:

Introduction to Offensive Cybersecurity

Module 6:

Identity and Access Management (IAM) Concepts

Module 18:

Penetration Testing Part 1

Module 7:

IAM Layers and Technology

Module 19:

Penetration Testing Part 2

Module 8:

Preparing for a Job in Cybersecurity Risk Management

Module 20:

Social Engineering

Module 9:

Introduction to Defensive Cybersecurity

Module 21:

Artificial Intelligence

Module 10:

Cryptography

Module 22:

Policy and Privacy, Regulation, and Data Governance

Module 11:

Security Operations Center (SOC)

Module 23:

OT and IoT Risk

Module 12:

Incident Response (IR)

Module 24:

Preparing for a Job in Offensive Cybersecurity Operations
Download Brochure

Program Faculty

Faculty Member KERI PEARLSON

KERI PEARLSON

Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's... More info

NICKOLAI ZELDOVICH

Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008. His research interests are in building practical secure systems. Recent projects... More info

Faculty Member DANNY WEITZNER

DANIEL J. WEITZNER

3Com Founders Principal Research Scientist, Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Daniel Weitzner is the founding director of the MIT Internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of... More info

STUART MADNICK

John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity. His involvement... More info

LARRY SUSSKIND

Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making... More info

UNA-MAY O'REILLY

Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL

Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting... More info

Faculty Member BARBARA JOHNSON

BARBARA JOHNSON

Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)2 Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI

Securing information systems is Barbara’s purpose and educating security professionals is her passion. Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for... More info

RAJIV SHRIDHAR

Information Security Officer and Director of Research Computing, MIT Sloan School of Management

Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students, and collaborators by providing specialized computing infrastructure, datasets, software... More info

Faculty Member HOWARD SHROBE

HOWARD SHROBE

Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts

Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL... More info

Financing Options* Starting at INR 6,114/ Month.

Option 1

Program Fee: INR 2,62,500
Maximum Loan Amount: INR 2,62,500
Tenure (months): 36
EMI/ month: INR 8,769

Option 2

Program Fee: INR 2,62,500
Maximum Loan Amount: INR 2,62,500
Tenure (months): 48
EMI/ month: INR 7,055

Option 3

Program Fee: INR 2,62,500
Maximum Loan Amount: INR 2,62,500
Tenure (months): 60
EMI/ month: INR 6,114

Also available in 12/ 18/ 24 months EMI plans.


Note:
The above EMI's are indicative and figures in INR are approx.
The EMI's offered by each of the loan providers might vary from the above figures, depending upon tenure and loan amount to be disbursed.
Our Program Advisors will help you with information on how to avail a loan from our loan providers.
*Applicable only for Indian residents.

Career Preparation and Guidance*

Emeritus, our learning collaborator for this program, provides the following career preparation services:

  • 1:1 Mentorship Sessions by an Emeritus Career Coach
  • Resume Building Group Workshops
  • LinkedIn Profile Building Group Workshops
  • Interview Preparation Group Workshops
  • 1:1 Mock Interviews by Industry Experts
  • Access to Emeritus' Career Services Job Portal
  • Participation in Career Fairs
  • Job Placement Assistance**

*Available to Indian residents only.

**Job placement assistance from partner companies are published, applied to, and tracked to success via an online platform.

Registration for this program is done through Emeritus. You can contact us at mit.xpro@emeritus.org

This programe is open for enrolments for residents of India, Bangladesh, Bhutan, Burma, Nepal, Pakistan, Sri Lanka, Philippines, Indonesia, Thailand, Vietnam and Malaysia only.
Apply Now

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available. Learn more.