Post Graduate Certificate in Cybersecurity

Mid- and Senior-level Professionals | Learn from MIT faculty and gain the MIT xPRO edge

Get Your Brochure

Course Dates
LAST DAY TO ENROLL

Course Duration

DURATION

10 Months, Online
10-12 hours per week

Course Fee

Apply between 17th November and 30th November with the code FUTUREYOU10 during payment to avail our festive discount offer

Registration for this program is done through Emeritus. You can contact us at mit.xpro@emeritus.org

This program is open for enrolments for residents of India, Bangladesh, Bhutan, Myanmar, Nepal, Pakistan, Sri Lanka, Philippines, Indonesia, Thailand, Vietnam and Malaysia only.
To ensure that holiday plans on the occasion of Christmas and New Year are not interrupted, no new modules will be released during this time and participants will receive a 2-week extension for submitting assignments. Participants will continue to have access to course material on the platform during this time.

Industry Trends

80%

Spike in Cybercrime in Asia Pacific Regions in 2021

SOURCE: (GROUP IB REPORT 2022)

3.5 Million

Cybersecurity jobs to be available globally

SOURCE: CYBERSECURITY JOBS REPORT 2021

The Massachusetts Institute of Technology (MIT) xPRO Advantage

#1

Private University

QS WORLD RANKING 2022

98

Nobel Prize Laureates

26

Turing Award Winners

Programme Highlights

Advance Your Career in Cybersecurity With MIT xPRO

A certificate from MIT xPRO to recognize your skills and success

Insights and case studies from renowned MIT faculty

Market-ready cybersecurity skills in a high-growth market

Capstone presentation project to share with potential employers

A great start towards a degree or certification in cybersecurity

The knowledge to obtain an entry-level position in cybersecurity

Who Is this Programme for?

Mid- and Senior-level career professionals who have established their careers in information technology and are looking to improve their organization's preparedness and response against cyberattacks and grow their career as leaders in cybersecurity strategies will benefit most from this programme.

Additionally, graduates and early career professionals with or without prior experience in the IT field who want to specialize in cybersecurity from a globally recognized school and accelerate their career in a high-growth field with high-demand job opportunities will benefit from this programme.

Past Participant Profile

Programme Frameworks

National Institute of Standards and Technology (NIST) Framework

The NIST CSF framework is threaded throughout the entire programme as a commonly used framework. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the def ensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.

MITRE ATT&CK®

The MITRE ATT&CK® knowledge base is explored deeper in the offensive and defensive pieces of this programme. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.

Tools Taught

Section Summaries

Section 1: Introduction to Cybersecurity

The first three months of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and IAM (identity and access management).

Section 2: Defensive Cybersecurity

The second set of three months focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.

Section 3: Offensive Cybersecurity

The next set of months address the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.

Apply between 17th November and 30th November with the code FUTUREYOU10 during payment to avail our festive discount offer

Programme Modules

Module 1:

Introduction to Cybersecurity Risk Management

Module 2:

Cybersecurity Foundation Concepts

Module 3:

Federal Government’s Role: Laws, Operations, and Standards

Module 4:

Threats and Vulnerabilities

Module 5:

Cybersecurity and Critical Urban Infrastructure

Module 6:

IAM(Identity Access Management) Concepts

Module 7:

Layers of IAM and Technologies

Module 8:

Preparing for a Job in Cybersecurity Risk Management

Module 9:

Intro to Defensive Cybersecurity

Module 10:

Cryptography

Module 11:

Security Operations Centre

Module 12:

Incident Response

Module 13:

Secure Systems Administration

Module 14:

Secure Network Administration

Module 15:

Cloud Security

Module 16:

Preparing for a Job in Cybersecurity Operations

Module 17:

Intro to Offensive Cybersecurity

Module 18:

Penetration Testing Part 1

Module 19:

Penetration Testing Part 2

Module 20:

Social Engineering

Module 21:

Artificial Intelligence

Module 22:

Policy and Privacy, Regulation, and Data Governance

Module 23:

OT and IoT Risk

Module 24:

Preparing for a Job in Offensive Cybersecurity Operations

Module 1:

Introduction to Cybersecurity Risk Management

Module 13:

Secure Systems Administration

Module 2:

Cybersecurity Foundation Concepts

Module 14:

Secure Network Administration

Module 3:

Federal Government’s Role: Laws, Operations, and Standards

Module 15:

Cloud Security

Module 4:

Threats and Vulnerabilities

Module 16:

Preparing for a Job in Cybersecurity Operations

Module 5:

Cybersecurity and Critical Urban Infrastructure

Module 17:

Intro to Offensive Cybersecurity

Module 6:

IAM(Identity Access Management) Concepts

Module 18:

Penetration Testing Part 1

Module 7:

Layers of IAM and Technologies

Module 19:

Penetration Testing Part 2

Module 8:

Preparing for a Job in Cybersecurity Risk Management

Module 20:

Social Engineering

Module 9:

Intro to Defensive Cybersecurity

Module 21:

Artificial Intelligence

Module 10:

Cryptography

Module 22:

Policy and Privacy, Regulation, and Data Governance

Module 11:

Security Operations Centre

Module 23:

OT and IoT Risk

Module 12:

Incident Response

Module 24:

Preparing for a Job in Offensive Cybersecurity Operations
Download Brochure

Capstone Project

  • Participants will work on a capstone project detailing the Equifax data breach of 2017 and associated events.
  • Participants will analyse the data breach which resulted in the breach of data of 140 million consumers.
  • They will investigate what were the primary reasons of the breach and gaps in cybersecurity in the case, using the knowledge gained during the course.
  • Participants would then create a defensive and offensive strategy to tackle such breaches and present their findings and their key insights in detail.
  • The project will help participants observe, analyse, and implement their learnings in a real-life case and get the best out of the MIT Post Graduate in Cybersecurity course.

Case Studies

The Solar Winds supply chain attack of 2020, which compromised several thousand Orion users

The Saudi Aramco cyberattack of 2012 which wiped out 35000 computers and put the operations of the biggest oil company in the world at risk

The Cisco debacle of 2018 where a Cisco engineer broke through the security of Cisco, accessed 456 virtual machines and deleted 16000 Webex accounts

The MIRAI botnet attack of 2016, a severe DDOS attack which rendered much of the internet of the US east coast inaccessible

A study of the cyberculture and best practices in Cybersecurity on Verizon media

The Ukraine PowerGrid attack of 2015 which blew power for 200000+ consumers for 1-6 hours in Ukraine

The Baltimore ransomware attack of 2019 where Baltimore city was attacked by the aggressive ransomware Robbin hood costing more than $18mn

Programme Certificate

Programme Certificate

Get recognized! Upon successful completion of this programme, MIT xPRO grants a certificate of completion to participants. This programme is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

Download Brochure

After successful completion of the programme, your verified digital certificate will be emailed to you, at no additional cost, with the name you used when registering for the programme. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

Programme Faculty

Faculty Member KERI PEARLSON

KERI PEARLSON

Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's... More info

NICKOLAI ZELDOVICH

Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008. His research interests are in building practical secure systems. Recent projects... More info

Faculty Member DANNY WEITZNER

DANIEL J. WEITZNER

3Com Founders Principal Research Scientist, Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Daniel Weitzner is the founding director of the MIT Internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of... More info

STUART MADNICK

John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity. His involvement... More info

Faculty Member LARRY SUSSKIND

LARRY SUSSKIND

Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making... More info

Faculty Member UNA-MAY O'REILLY

UNA-MAY O'REILLY

Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL

Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting... More info

Faculty Member BARBARA JOHNSON

BARBARA JOHNSON

Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)2 Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI

Securing information systems is Barbara's purpose and educating security professionals is her passion. Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for... More info

RAJIV SHRIDHAR

Information Security Officer and Director of Research Computing, MIT Sloan School of Management

Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students, and collaborators by providing specialized computing infrastructure, datasets, software... More info

Faculty Member HOWARD SHROBE

HOWARD SHROBE

Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts

Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL... More info

Financing Options* Starting at INR 7,000/ Month.

Option 1

Program Fee: INR 2,80,000
Maximum Loan Amount: INR 2,80,000
Tenure (months): 12
EMI/ month: INR 25,667

Option 2

Program Fee: INR 2,80,000
Maximum Loan Amount: INR 2,80,000
Tenure (months): 36
EMI/ month: INR 10,111

Option 3

Program Fee: INR 2,80,000
Maximum Loan Amount: INR 2,80,000
Tenure (months): 60
EMI/ month: INR 7,000

Also available in 12/ 18/ 24 months EMI plans.


Note:
The above EMI's are indicative and figures in INR are approx.
The EMI's offered by each of the loan providers might vary from the above figures, depending upon tenure and loan amount to be disbursed.
Our Programme Advisors will help you with information on how to avail a loan from our loan providers.
*Applicable only for Indian residents.

Emeritus Career Services*

  • Career Management Modules on:
    • Building an Impressive Resume & Cover Letter
    • Building an Impressive LinkedIn Profile
    • Navigating Job Search
    • Interview Preparation
  • Job placement assistance from partner companies are published, applied to, and tracked to success via an online platform
  • Past participants of Emeritus work at Microsoft, ICICI Bank, Infosys, HDFC, AirBnB, TCS, Ola, Flipkart, JSW, Wipro, Honeywell, JP Morgan, Reliance Jio, Mahindra, Gartner, Accenture, Cognizant, amongst others

Please note:

  • This service is available only for Indian residents enrolled into select Emeritus programmes.
  • MIT xPRO or Emeritus do NOT promise or guarantee a job or progression in your current job. Career Services is only offered as a service that empowers you to manage your career proactively. The Career Services mentioned here are offered by Emeritus. MIT xPRO is NOT involved in any way and makes no commitments regarding the Career Services mentioned here.

Programme Mentor & Learning Facilitators

Dinesh is an Information Security Management professional working in the IT/IS domain for more than a decade on consulting, auditing, and advisory projects in India and overseas.

Having extensive business experience in trading, manufacturing, and IT sector he brings a unique blend of techno commercial expertise to offering advisory and strategic consulting services in Cyber Security. He is a Virtual CISO for several clients and provides cybersecurity audit, fraud and forensic investigation services to clients in India and EMEA.

He is a hands-on professional in Security Risk Management, GRC, Security Incident Investigation, Response and Management, SOC setup, ISMS, Cloud Security and Compliance with national and international regulatory guidelines.

— Dinesh Bareja – Mentor, Founder & COO - Open Security Alliance and IndiaWatch.in Advisor - Cyber Peace Foundation & Defence Institute of Advanced Technology Ex Cyber Surveillance Advisor - Jharkhand Police

Bhowmik Shah is a seasoned Systems and Security professional with global experience with enterprises across Australia, USA, and India. He has an extensive background in DevOps and Cyber Security with more than 15 years spent designing and securing systems, applications, and infrastructure. As an ISO27001 Lead Auditor he also has experience with managing governance and compliance for enterprises. 

Currently a Co-Founder at CyberNX, he functions as the Chief Technology Officer & Cyber Security subject matter expert. Taking on the mantle of running and scaling a business in addition to tackling client boardroom and committee meetings where he functions as a Chief Information Security Officer.

— Bhowmik Shah - Learning Facilitator, Co-Founder and Chief Technology Officer - CyberNX Technologies Private Limited

Over 26 years of IT Enterprise and academic experience with multinational organizations. Expertise in Cybersecurity, Digital Forensics, IT Security & Operations Management, and Networks, Virtualization. He works with local Cyber cell and Investigation agencies to train and support. He has Published over 75 research papers, books, chapters & patent in referred journals. Editorial Review Board and Associate Editor for several international journals. Leading Post Graduate Cyber Defense, Cybersecurity COE, Academic-Industry collaborations, MoU with NVIDIA AI, Data Security Council of India, Softlink, and CompTIA.

— Dr. Akashdeep Bhardwaj - Learning Facilitator, Research Professor (Cyber Security & Digital Forensics) - University of Petroleum and Energy Studies Subject Matter Expert: Security+ - CompTIA International Advisory Board Member - Certified Ethical Hacking (CEH) - EC-Council

Note: These are Learning Facilitators from the previous batches. Learning Facilitators may change for upcoming batches subject to availability.

Office Hours : Every Saturday 19:00 Hours IST

Registration for this programme is done through Emeritus. You can contact us at mit.xpro@emeritus.org

This programme is open for enrolments for residents of India, Bangladesh, Bhutan, Myanmar, Nepal, Pakistan, Sri Lanka, Philippines, Indonesia, Thailand, Vietnam and Malaysia only.

Apply between 17th November and 30th November with the code FUTUREYOU10 during payment to avail our festive discount offer

Apply Now

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available. Learn more.