The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.

Courtlyn
Promotion and Events SpecialistMid- and Senior-level Professionals | No Prior Experience in IT Field Required | Learn from MIT faculty and gain the MIT xPRO edge
August 17, 2022
10 Months, Online
10-12 hours per week
US$3,500 US$3,300 or get US$350 off with a referral
Our participants tell us that taking this program together with their colleagues helps to share common language and accelerate impact.
We hope you find the same. Special pricing is available for groups.
The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.
Courtlyn
Promotion and Events SpecialistBased on the information you provided, your team is eligible for a special discount, for Post Graduate Certificate in Cybersecurity starting on August 17, 2022 .
We’ve sent you an email with enrollment next steps. If you’re ready to enroll now, click the button below.
Have questions? Email us at group-enrollments@emeritus.org.
EMIs as low as INR 6,114/ month.
Learn more
Apply before July 21, 2022 and avail a tuition assistance of USD 200.
Discount will be auto-applied during payment.
Spike in Cybercrime in Asia Pacific Regions in 2021
Cybersecurity jobs to be available globally
Private University
Nobel Prize Laureates
Turing Award Winners
Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants. This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.
Download BrochureAfter successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, with the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.
A certificate from MIT xPRO to recognize your skills and success
Insights and case studies from renowned MIT faculty
Market-ready cybersecurity skills in a high-growth market
Capstone presentation project to share with potential employers
A great start towards a degree or certification in cybersecurity
The knowledge to obtain an entry-level position in cybersecurity
The NIST CSF framework is threaded throughout the entire program as a commonly used framework. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.
The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the def ensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.
The MITRE ATT&CK® knowledge base is explored deeper in the offensive and defensive pieces of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.
The first three months of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and IAM (identity and access management).
The second set of three months focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.
The next set of months address the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.
![]()
KERI PEARLSON
Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management
Dr. Pearlson is the executive director of Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's Research Board, CSC, and AT&T. She founded KP Partners, a CIO advisory services organization, and the IT Leaders' Forum, a community of next-generation IT executives. She is the founding director of the Analytics Leadership Consortium at the International Institute of Analytics. She began her career at Hughes Aircraft Company as a systems analyst.
Dr. Pearlson's research spans MIS, business strategy, and organizational design. Her current research studies how organizations build a culture of cybersecurity and how organizations build trust to share mitigations for cyber breaches. Dr. Pearlson holds a doctorate in business administration in MIS from Harvard Business School, along with an M.S. in industrial engineering and a B.S. in mathematics from Stanford University. She is the founding president of the Austin Society for Information Management and was named "2014 National SIM Leader of the Year."
![]()
NICKOLAI ZELDOVICH
Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT
Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008. His research interests are in building practical secure systems. Recent projects by Prof. Zeldovich and his students and colleagues include the CryptDB encrypted database, the STACK tool for finding undefined behavior bugs in C programs, the FSCQ formally verified file system, the Algorand cryptocurrency, and the Vuvuzela private messaging system.
Dr. Zeldovich has been involved with several startup companies, including MokaFive (desktop virtualization), PreVeil (end-to-end encryption), and Algorand (cryptocurrency). His work has been recognized with "best paper" awards at the ACM SOSP conference, a Sloan fellowship (2010), an NSF CAREER award (2011), the MIT EECS Spira teaching award (2013), the MIT Edgerton faculty achievement award (2014), the ACM SIGOPS Mark Weiser award (2017), and an MIT EECS Faculty Research Innovation Fellowship (2018).
![]()
DANIEL J. WEITZNER
3Com Founders Principal Research Scientist, Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab
Daniel Weitzner is the founding director of the MIT Internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of accountable systems to enable the computational treatment of legal rules.
He was U.S. Deputy Chief Technology Officer for internet policy in the White House, where he led initiatives on privacy, cybersecurity, copyright, and digital trade policies promoting the free flow of information. He was responsible for the Obama administration's Consumer Privacy Bill of Rights and the OECD Internet Policymaking Principles. He has a law degree from Buffalo Law School, and a B.A. in philosophy from Swarthmore College. His writings have appeared in Science, the Yale Law Review, Communications of the ACM, Washington Post, Wired Magazine, and Social Research.
![]()
STUART MADNICK
John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)
Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity. His involvement in cybersecurity research goes back to 1979, when he co-authored the book Computer Security. Currently, he heads the Cybersecurity at MIT Sloan Initiative.
Dr. Madnick holds a Ph.D. in computer science from MIT and has been an MIT faculty member since 1972. He served as head of MIT's Information Technologies Group in the Sloan School of Management for more than 20 years. He is the author or co-author of more than 300 books, articles, and reports. Besides cybersecurity, his research interests include big data, semantic connectivity, database technology, software project management, and the strategic use of information technology.
![]()
LARRY SUSSKIND
Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School
Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making, the resolution of science-intensive policy disputes, renewable energy policy, water equity in older American cities, climate change adaptation, socially responsible real estate development, and the land claims of Indigenous peoples.
Prof. Susskind is the director of the MIT Science Impact Collaborative. He is the founder of the Consensus Building Institute, a Cambridge-based not-for- profit organization that provides mediation services in complex resource management disputes around the world. He is also one of the co- founders of the interuniversity Program on Negotiation at Harvard Law School, where he now directs the MIT-Harvard Public Disputes Program, serves as Vice Chair for Instruction, and leads PON's Master Classes in Negotiation. He is the recipient of ACSP's prestigious Educator of the Year Award and recipient of MIT's Award for Digital Instruction.
![]()
UNA-MAY O'REILLY
Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL
Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting tools and cyber arms race models.
One of the main areas Dr. O'Reilly is investigating is cybersecurity and how to stop destructive and escalating arms races. She hopes to understand the nature of adversarial intelligence by computationally replicating it—that is, by developing "artificial adversarial intelligence." This helps reveal the dynamics of conflicting behavior and how adaptation drives it so that these types of arms races can be stopped. Dr. O'Reilly holds a Ph.D. from Carleton University in Ottawa, Canada.
![]()
BARBARA JOHNSON
Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)2 Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI
Securing information systems is Barbara’s purpose and educating security professionals is her passion.
Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for the government, automotive, entertainment, financial, and travel sectors. Her security, privacy, risk, and audit frameworks include ISO 27001, ISACA COBIT, NIST, HIPAA, and PCI. She brings global best practices into her client’s enterprise security governance, policies, standards, architecture, and operations, including cryptography, incident response, and business continuity, and disaster recovery. However, she tailors a security strategy to a client’s industry and risk appetite.
Barbara enhances educational delivery as a security, audit, and compliance practitioner. Barbara is a lecturer at MIT Sloan School of Management and a courseware developer for the MIT xPRO Cyber Program. For (ISC)2 CISSP and ISSMP: she develops courseware, teaches as a senior and lead instructor, speaks at Security Congress, and was Chair of (ISC)2 Common Body of Knowledge. Furthermore, she imparts ISACA global best practices through its CISA, CISM, and CRISC certification classes. As a security educator, she has readied thousands of security professionals for certification exams.
![]()
RAJIV SHRIDHAR
Information Security Officer and Director of Research Computing, MIT Sloan School of Management
Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students, and collaborators by providing specialized computing infrastructure, datasets, software tools, support, and technology consulting. As Information Security Officer, he is responsible for the development and oversight of risk and security frameworks in alignment with the information security needs of MIT Sloan.
Rajiv is a senior lecturer at Northeastern University, where he teaches graduate-level programs in computer engineering, cyber-physical systems, and telecommunication networks. In his teaching, he seeks to maximize student learning outcomes by reinforcing and extending inclass learning with experiential education via extensive hands-on projects, labs, and assignments. Rajiv received an M.S. in Computer Systems Engineering from Northeastern University.
![]()
HOWARD SHROBE
Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts
Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL initiative. His research interests include AI, cybersecurity (particularly control systems), and new computer architectures for inherently secure computing. Howard has a Ph.D. from MIT.
Option 1
Program Fee: INR 2,62,500
Maximum Loan Amount: INR 2,62,500
Tenure (months): 36
EMI/ month: INR 8,769
Option 2
Program Fee: INR 2,62,500
Maximum Loan Amount: INR 2,62,500
Tenure (months): 48
EMI/ month: INR 7,055
Option 3
Program Fee: INR 2,62,500
Maximum Loan Amount: INR 2,62,500
Tenure (months): 60
EMI/ month: INR 6,114
Also available in 12/ 18/ 24 months EMI plans.
Emeritus, our learning collaborator for this program, provides the following career preparation services:
*Available to Indian residents only.
**Job placement assistance from partner companies are published, applied to, and tracked to success via an online platform.
Flexible payment options available.