Post Graduate Certificate in Cybersecurity

Mid- and Senior-level Professionals | Learn from MIT faculty and gain the MIT xPRO edge

Get Your Brochure

Course Dates


August 17, 2022

Course Duration


10 Months, Online
10-12 hours per week

Course Fee

Application Details

program fee


Pay by
This programme is open for enrolments for residents of India, Bangladesh, Bhutan, Myanmar, Nepal, Pakistan, Sri Lanka, Philippines, Indonesia, Thailand, Vietnam and Malaysia only.

Application Deadline: August 2, 2022

EMIs as low as INR 7,541/ month.
Learn more

Industry Trends


Spike in Cybercrime in Asia Pacific Regions in 2021


3.5 Million

Cybersecurity jobs to be available globally


Programme Highlights

Advance Your Career in Cybersecurity With MIT xPRO

A certificate from MIT xPRO to recognize your skills and success

Insights and case studies from renowned MIT faculty

Market-ready cybersecurity skills in a high-growth market

Capstone presentation project to share with potential employers

A great start towards a degree or certification in cybersecurity

The knowledge to obtain an entry-level position in cybersecurity

Who Is this Programme for?

Mid- and Senior-level career professionals who have established their careers in information technology and are looking to improve their organization's preparedness and response against cyberattacks and grow their career as leaders in cybersecurity strategies will benefit most from this programme.

Additionally, graduates and early career professionals with or without prior experience in the IT field who want to specialize in cybersecurity from a globally recognized school and accelerate their career in a high-growth field with high-demand job opportunities will benefit from this programme.
Past Participant Profile

Past Participant Profile

Programme Frameworks

National Institute of Standards and Technology (NIST) Framework

The NIST CSF framework is threaded throughout the entire programme as a commonly used framework. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the def ensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.


The MITRE ATT&CK® knowledge base is explored deeper in the offensive and defensive pieces of this programme. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.

Tools Taught

Section Summaries

Section 1: Introduction to Cybersecurity

The first three months of this programme serve as an introduction to cybersecurity with a focus on fundamental concepts and IAM (identity and access management).

Section 2: Defensive Cybersecurity

The second set of three months focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.

Section 3: Offensive Cybersecurity

The next set of months address the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.

Programme Modules

    • Foundations of Cybersecurity
    • Protecting Organizations
    • Cybersecurity as an Rrganization
    • Current Events
    • Cybersecurity as Risk Management
    • Basic Concepts of Cybersecurity
    • Secure Implementation
    • Isolation, Sharing and Access
    • Privilege Separation
    • Laws: Federal, State, And International
    • Privacy
    • Federal Criminal Law, Data Breach
    • Cybersecurity Frameworks : NIST/CIS/SOC GDPR Indian Cybersecurity Laws
    • Threats: Disruption Of Operations And Attacks On Internet Of Things (IoT) And Equipment
    • Vulnerability Analysis and Management
    • Publicizing Threats
    • Vulnerabilities : Basic Technical Attacks
    • Social Engineering Attacks
    • Initial Communication with a Client Agency
    • Preparing a Vulnerability Assessment
    • Case Study on Baltimore
    • Vulnerability Management Processes, Challenges and Opportunities
    • IAM Principles and Concepts
    • Authenticationt Authorization to Resources and Audit and Accountability
    • IAM Training and Testing IAM Policy Standards and Procedure
    • Identification
    • Business Context
    • Session Management
    • Network IAM Data IAM Control Techniques
    • SSO FIM Concepts
    • Client IAM
    • Risks and Controls
    • IAM Industry
    • IAM Role
    • Third-Party Risks
    • Defence in Depth
    • Frameworks
    • Security Roles and Security Organizations
    • Repercussions of Inadequate Defence
    • Layers of Defence and Security Processes
    • Applying the NIST Model Défense in Depth Security Processes
    • Networking Communication
    • Hash Functions
    • Certificates and Channels
    • Securing Data Message Authentication Code
    • Encryptions and Signatures
    • SOC Performers Services and Tools
    • Reactive and Automatic Threat Detection Services and Tools for Threat Detection
    • Analysts
    • SOC Roles and Skills
    • IR Overview
    • Reflection
    • IR Key Components(Detection and Analysis) Containment, Eradication and Recovery
    • IR Roles and Responsibilities
    • Importance of Secure Administration and the Administration Role
    • Combating Threats
    • Validating
    • IBest Practices
    • Proactivity
    • Terms and Technology Importance of Security Network Administration
    • Standard Policies and Frameworks
    • Strategies of Network Security Administration
    • Cloud Computing
    • Security and Infrastructure Management
    • Cloud Security Alliance (CSA) Cloud Controls Matrix Azure vs AWS vs GCP
    • Cloud Services Models and Deployment
    • Role of Cloud in Zero-Trust Security Ransomware
    • Additional Defence in Depth VPNs
    • Cyber Failures
    • Privileged Access Management
    • Secure Development Life Cycle
    • Security Architecture and Strategy
    • NIST CSF and Offensive Cybersecurity
    • Threat Modelling The Red Team and Penetration Testing
    • The Attacker Mindset Security Assessment, Evaluation and Testing Cycle
    • Intro to Penetration Testing
    • Why Penetration Testing is Conducted
    • Penetration Testing Professionals
    • Concepts and Foundations
    • When is Penetration Testing Performed Frameworks of Penetration Testing
    • Penetration Testing Planning, Goals, Objectives and Scope
    • Enumeration Vulnerability Mapping
    • Reporting
    • Discovery and Reconnaissance
    • Access Red Team/Blue Team
    • Social Engineering Concepts
    • Phishing and Its Variants Email Hacks
    • Social Engineering: Roles and Responsibilities
    • Types of Social Engineering
    • Reducing Risk
    • AI and ML
    • Malware Detection
    • Social Engineering: Roles and Responsibilities
    • Preparation and Modifications
    • Settings and Challenges
    • Models and Neural Networks
    • Principles and Laws
    • Design Approaches
    • Data Breaches Terms
    • Privacy Impact Assessments
    • IOT and OT Concepts
    • Vulnerabilities of IOT, Operational Technology (OT)
    • Problems with IOT
    • Mitigations
    • Concluding Topics Cybersecurity Toolkit
    • Professional Advice
    • Positions and Skills

Capstone Project

  • Participants will work on a capstone project detailing the Equifax data breach of 2017 and associated events.
  • Participants will analyse the data breach which resulted in the breach of data of 140 million consumers.
  • They will investigate what were the primary reasons of the breach and gaps in cybersecurity in the case, using the knowledge gained during the course.
  • Participants would then create a defensive and offensive strategy to tackle such breaches and present their findings and their key insights in detail.
  • The project will help participants observe, analyse, and implement their learnings in a real-life case and get the best out of the MIT Post Graduate in Cybersecurity course.

Case Studies

The Solar Winds supply chain attack of 2020, which compromised several thousand Orion users

The Saudi Aramco cyberattack of 2012 which wiped out 35000 computers and put the operations of the biggest oil company in the world at risk

The Cisco debacle of 2018 where a Cisco engineer broke through the security of Cisco, accessed 456 virtual machines and deleted 16000 Webex accounts

The MIRAI botnet attack of 2016, a severe DDOS attack which rendered much of the internet of the US east coast inaccessible

A study of the cyberculture and best practices in Cybersecurity on Verizon media

The Ukraine PowerGrid attack of 2015 which blew power for 200000+ consumers for 1-6 hours in Ukraine

The Baltimore ransomware attack of 2019 where Baltimore city was attacked by the aggressive ransomware Robbin hood costing more than $18mn

Programme Certificate

Example image of certificate that will be awarded after successful completion of this program

Programme Certificate

Get recognized! Upon successful completion of this programme, MIT xPRO grants a certificate of completion to participants. This programme is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

Download Brochure

After successful completion of the programme, your verified digital certificate will be emailed to you, at no additional cost, with the name you used when registering for the programme. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

Programme Faculty

Faculty Member KERI PEARLSON


Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's... More info


Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008. His research interests are in building practical secure systems. Recent projects... More info



3Com Founders Principal Research Scientist, Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Daniel Weitzner is the founding director of the MIT Internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of... More info


John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity. His involvement... More info



Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Programme on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making... More info

Faculty Member UNA-MAY O'REILLY


Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL

Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for programme representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting... More info



Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)2 Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI

Securing information systems is Barbara’s purpose and educating security professionals is her passion. Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programmes for... More info


Information Security Officer and Director of Research Computing, MIT Sloan School of Management

Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students, and collaborators by providing specialized computing infrastructure, datasets, software... More info

Faculty Member HOWARD SHROBE


Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts

Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL... More info

Financing Options* Starting at INR 7,541/ Month.

Option 1

Programme Fee: INR 2,80,595
Maximum Loan Amount: INR 2,80,595
Tenure (months): 36
EMI/ month: INR 9,373

Option 2

Programme Fee: INR 2,80,595
Maximum Loan Amount: INR 2,80,595
Tenure (months): 48
EMI/ month: INR 7,541

Option 3

Programme Fee: INR 2,80,595
Maximum Loan Amount: INR 2,80,595
Tenure (months): 60
EMI/ month: INR 7,541

Also available in 12/ 18/ 24 months EMI plans.

The above EMI's are indicative and figures in INR are approx.
The EMI's offered by each of the loan providers might vary from the above figures, depending upon tenure and loan amount to be disbursed.
Our Programme Advisors will help you with information on how to avail a loan from our loan providers.
*Applicable only for Indian residents.

Emeritus Career Services*

Career Management Modules on:

  • Building an Impressive Resume & Cover Letter
  • Building an Impressive LinkedIn Profile
  • Navigating Job Search
  • Interview Preparation

*Available to Indian residents only.

**Job placement assistance from partner companies are published, applied to, and tracked to success via an online platform.

Programme Mentor & Learning Facilitators

Dinesh is an Information Security Management professional working in the IT/IS domain for more than a decade on consulting, auditing, and advisory projects in India and overseas.

Having extensive business experience in trading, manufacturing, and IT sector he brings a unique blend of techno commercial expertise to offering advisory and strategic consulting services in Cyber Security. He is a Virtual CISO for several clients and provides cybersecurity audit, fraud and forensic investigation services to clients in India and EMEA.

He is a hands-on professional in Security Risk Management, GRC, Security Incident Investigation, Response and Management, SOC setup, ISMS, Cloud Security and Compliance with national and international regulatory guidelines.

— Dinesh Bareja – Mentor, Founder & COO - Open Security Alliance and Advisor - Cyber Peace Foundation & Defence Institute of Advanced Technology Ex Cyber Surveillance Advisor - Jharkhand Police

Bhowmik Shah is a seasoned Systems and Security professional with global experience with enterprises across Australia, USA, and India. He has an extensive background in DevOps and Cyber Security with more than 15 years spent designing and securing systems, applications, and infrastructure. As an ISO27001 Lead Auditor he also has experience with managing governance and compliance for enterprises. 

Currently a Co-Founder at CyberNX, he functions as the Chief Technology Officer & Cyber Security subject matter expert. Taking on the mantle of running and scaling a business in addition to tackling client boardroom and committee meetings where he functions as a Chief Information Security Officer.

— Bhowmik Shah - Learning Facilitator, Co-Founder and Chief Technology Officer - CyberNX Technologies Private Limited

Over 26 years of IT Enterprise and academic experience with multinational organizations. Expertise in Cybersecurity, Digital Forensics, IT Security & Operations Management, and Networks, Virtualization. He works with local Cyber cell and Investigation agencies to train and support. He has Published over 75 research papers, books, chapters & patent in referred journals. Editorial Review Board and Associate Editor for several international journals. Leading Post Graduate Cyber Defense, Cybersecurity COE, Academic-Industry collaborations, MoU with NVIDIA AI, Data Security Council of India, Softlink, and CompTIA.

— Dr. Akashdeep Bhardwaj - Learning Facilitator, Research Professor (Cyber Security & Digital Forensics) - University of Petroleum and Energy Studies Subject Matter Expert: Security+ - CompTIA International Advisory Board Member - Certified Ethical Hacking (CEH) - EC-Council

Note: These are Learning Facilitators from the previous batches. Learning Facilitators may change for upcoming batches subject to availability.

Office Hours : Every Saturday 19:00 Hours IST

Registration for this programme is done through Emeritus. You can contact us at

This programme is open for enrolments for residents of India, Bangladesh, Bhutan, Myanmar, Nepal, Pakistan, Sri Lanka, Philippines, Indonesia, Thailand, Vietnam and Malaysia only.
Apply Now

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available. Learn more.