Professional Certificate in Cybersecurity

Accelerate your career in cybersecurity in 24 weeks, online

Apply Now

Get Your Brochure

Course Dates

STARTS ON

June 28, 2023

Course Duration

DURATION

24 weeks, online
15–20 hours per week

Course Fee

PROGRAM FEE

US$7,450

Explore financing options available for this program.
Learn More

Advance Your Career in Cybersecurity with MIT xPRO

Cyberattacks are becoming more frequent, complex, and targeted, collectively costing organizations billions of dollars every year. This is why cybersecurity is one of the fastest growing industries in the US, as every year more companies and government agencies seek to hire cybersecurity professionals with the specialized technical skills needed to defend mission-critical computer systems, networks, and cloud applications, against cyberattacks.

Enroll today in the MIT xPRO Professional Certificate in Cybersecurity program, which focuses on both defensive and offensive aspects of the technology. It also includes personalized feedback from program leaders, insights from guest speakers, career coaching, mentorship, and the opportunity to create a capstone project on network development to use for a job portfolio.

Take the next step to advance your career with the MIT xPRO Professional Certificate in Cybersecurity program.

$403 Billion

The projected value of the cybersecurity market through 2027

Source: Forbes

600,000

The number of unfilled cybersecurity positions in the US in 2022

Source: Bloomberg

Who Is This Program For?

This program is a career accelerator for those who want to learn the essentials of cybersecurity from MIT faculty.

  • Career Launchers: Early-career IT professionals, network engineers, and system administrators wanting to gain a comprehensive overview of cybersecurity and prepare themselves for continued career progression in this high-growth field.
  • Career Builders: IT project managers and engineers wanting to gain the ability to think critically about the threat landscape including vulnerabilities in cybersecurity, to better understand what kind of cybersecurity to specialize in, and upgrade their own resume for career advancement
  • Career Switchers: Mid- or later-career professionals currently working outside of cybersecurity wanting to add critical cybersecurity knowledge and foundational lessons to their resume as they begin considering a career change to an in-demand field.
Download Brochure

Program Frameworks

MITRE ATT&CK®

The MITRE ATT&CK knowledge base is explored deeper in the offensive and defensive aspects of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the defensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.

National Institute of Standards and Technology (NIST) Framework

The NIST CSF framework is threaded throughout the entire program. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

Section Summaries

Decorative image relating to text that follows

Section 1: Introduction to Cybersecurity

The first eight weeks of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and identity and access management (IAM).

Decorative image relating to text that follows

Section 2: Defensive Cybersecurity

The second set of eight weeks focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.

Decorative image relating to text that follows

Section 3: Offensive Cybersecurity

The final set of eight weeks addresses the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.

Program Highlights

Decorative image relating to text that follows

Earn a certificate and 36 Continuing Education Units (CEUs) from MIT xPRO

Decorative image relating to text that follows

Insights and case studies from renowned MIT faculty

Decorative image relating to text that follows

Foundational cybersecurity knowledge

Decorative image relating to text that follows

Completion of a capstone presentation to share with potential employers

Decorative image relating to text that follows

A great foundation towards a degree or certification in cybersecurity

Program Topics

Whether you are just starting your IT career or expanding into an adjacent field, this comprehensive program will equip you with the foundational knowledge needed to succeed in the field of cybersecurity. This 24-week program includes the following modules:

Week 1:

Introduction to Cybersecurity Risk Management

Week 2:

Cybersecurity Foundation Concepts

Week 3:

Federal Government Role: Law, Operations, and Standards

Week 4:

Threats and Vulnerabilities

Week 5:

Cybersecurity for Critical Urban Infrastructure

Week 6:

Identity and Access Management (IAM) Concepts

Week 7:

IAM Layers and Technology

Week 8:

Preparing for a Job in Cybersecurity Risk Management

Week 9:

Introduction to Defensive Cybersecurity

Week 10:

Cryptography

Week 11:

Security Operations Center (SOC)

Week 12:

Incident Response (IR)

Week 13:

Secure Systems Administration

Week 14:

Secure Network Administration

Week 15:

Cloud Security

Week 16:

Preparing for a Job in Cybersecurity Operations

Week 17:

Introduction to Offensive Cybersecurity

Week 18:

Penetration Testing Part 1

Week 19:

Penetration Testing Part 2

Week 20:

Social Engineering

Week 21:

Artificial Intelligence

Week 22:

Policy and Privacy, Regulation, and Data Governance

Week 23:

OT and IoT Risk

Week 24:

Preparing for a Job in Offensive Cybersecurity Operations

Week 1:

Introduction to Cybersecurity Risk Management

Week 13:

Secure Systems Administration

Week 2:

Cybersecurity Foundation Concepts

Week 14:

Secure Network Administration

Week 3:

Federal Government Role: Law, Operations, and Standards

Week 15:

Cloud Security

Week 4:

Threats and Vulnerabilities

Week 16:

Preparing for a Job in Cybersecurity Operations

Week 5:

Cybersecurity for Critical Urban Infrastructure

Week 17:

Introduction to Offensive Cybersecurity

Week 6:

Identity and Access Management (IAM) Concepts

Week 18:

Penetration Testing Part 1

Week 7:

IAM Layers and Technology

Week 19:

Penetration Testing Part 2

Week 8:

Preparing for a Job in Cybersecurity Risk Management

Week 20:

Social Engineering

Week 9:

Introduction to Defensive Cybersecurity

Week 21:

Artificial Intelligence

Week 10:

Cryptography

Week 22:

Policy and Privacy, Regulation, and Data Governance

Week 11:

Security Operations Center (SOC)

Week 23:

OT and IoT Risk

Week 12:

Incident Response (IR)

Week 24:

Preparing for a Job in Offensive Cybersecurity Operations
Download Brochure

Career Preparation and Guidance

Stepping into a career in cybersecurity requires a variety of skills, both hard and soft. This program offers guidance in navigating a career path in tech, including crafting your elevator pitch and providing communication tips. These services are provided by Emeritus, our learning collaborator for this program. The program support team includes course leaders who help you reach your learning goals and career coaches to guide you through your job search. The program offers career preparation and guidance, however, job placement is not guaranteed.

Emeritus provides the following career preparation services:

  • Crafting your elevator pitch
  • LinkedIn profile guidance
  • Resume/cover letters
  • Navigating your job search
  • Interview tips and preparation
  • Negotiating salary

Career exercises focused on launching a career in cybersecurity include:

  • Job searching and interviewing for cybersecurity positions
  • Building your personal brand and promoting your skills
  • Communicating cybersecurity concepts through presentation skills

Program Instructors

Faculty Member Keri Pearlson

Keri Pearlson

Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of the Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's Research Board, CSC,.. More info

Faculty Member Nickolai Zeldovich

Nickolai Zeldovich

Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008... More info

Faculty Member Stuart Madnick

Stuart Madnick

John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus, at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity... More info

Faculty Member Danny Weitzner

Danny Weitzner

3Com Founders Principal Research Scientist Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Prof. Weitzner is founding director of the MIT internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of accountable systems to enable computational treatment of legal rules... More info

Faculty Member Larry Susskind

Larry Susskind

Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making... More info

Faculty Member Una-May O'Reilly

Una-May O'Reilly

Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL

Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting tools and cyber arms race models... More info

Faculty Member Barbara Johnson

Barbara Johnson

Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)² Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI

Securing information systems is Barbara’s purpose and educating security professionals is her passion. Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for the government, automotive, entertainment, financial, and travel sectors... More info

Faculty Member Rajiv Shridhar

Rajiv Shridhar

Information Security Officer and Director of Research Computing, MIT Sloan School of Management

Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students and collaborators by providing specialized computing infrastructure, data sets, software tools... More info

Faculty Member Howard Shrobe

Howard Shrobe

Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts

Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL initiative... More info

Guest Speakers

Faculty Member Caren Shiozaki

Caren Shiozaki

EVP-CIO for TMST, Inc., New Mexico. Vice Chair for SIM and Founder of the SIM Cybersecurity SIG

Caren Shiozaki is EVP-CIO for TMST, Inc., a mortgage organization in Santa Fe, New Mexico. She is also a Senior Fellow with the DivIHN Center of Excellence for digital security and risk. Previously she was CIO for a Dallas-based media organization. She has worked internationally for Bank of America and American Express. Caren is Chair Emeritus for SIM's National Board and co-founder of the national Digital Risk SIG. She is board chair for the Santa Fe Alliance for Science and the Santa Fe Animal Shelter. She holds professional certifications in corporate governance and data privacy and is a certified e-discovery specialist. She holds a degree in genetics from UC Berkeley.

Faculty Member Erica Wilson

Erica Wilson

CISO for Cass Information Systems

Erica Wilson has over 20 years of IT experience, 18 of which are in the field of cybersecurity. Erica currently serves as the CISO for Cass Information Systems. She has responsibility for all aspects of the company’s cybersecurity program, including security strategy, policies and procedures, technologies, and training. In addition, Erica leads all aspects of technology risk management, including compliance with internal and regulatory controls as well as the Business Continuity Program. Erica also has a passion for STEM education. Throughout her professional career, she has consistently identified ways to influence and encourage others in the community to explore opportunities to work in the field of information technology and cybersecurity. In this program.

Faculty Member Ion Santotomas

Ion Santotomas

Lead Security Analyst at Schneider Electric

Ion is a diligent senior cybersecurity professional with a strong technical background in systems engineering and infrastructure management. Ion is passionate about both offensive and defensive aspects of cybersecurity and actively participates in events, conferences, and online challenges to sharpen his technical skills and knowledge about the latest trends and attack vectors in order to become a better defender.

Faculty Member Daniel Gorecki

Daniel Gorecki

Group Information Security Manager & CISO at Ascot Group

Daniel Gorecki is a Group Information Security Manager and CISO at Ascot Group. In this role he manages a global team for information risk management and cyber resiliency for the global organization. Prior to joining Ascot Group, he was the CISO at Aramark and held the CISO and CIO roles at Intercept Pharmaceuticals. Dan maintains the certification for Certified Information Systems Security Professional (CISSP), Certified Data Privacy Solutions Engineer (CDPSE), has completed SIM's Regional Leadership Forum for IT Executives, and holds a B.E. in Computer Engineering from Stony Brook University.

Faculty Member Josh Schwartz

Josh Schwartz

Senior Director of Technical Security for The Paranoids, the Information Security Team at Yahoo

Josh Schwartz is the Senior Director of Technical Security for The Paranoids, the information security team at Yahoo, where he oversees an organization focused on offensive security assessments, red team methodology, and building products that support security culture and behavioral change initiatives.

Faculty Member Matthew Lange

Matthew Lange

Assistant Director of the Adversarial Security Testing team at Northwestern Mutual

Matt Lange is currently the Assistant Director of the Adversarial Security Testing team at Northwestern Mutual where he leads a team of offensive security professionals accountable for penetration testing, red teaming, and purple teaming. He began his career in cybersecurity as an incident responder and forensic analyst. He quickly transitioned to penetration testing and red teaming where he helped build those programs from scratch. Matt graduated from the University of Wisconsin where he double majored in Mandarin Chinese and East Asian Politics, as well as Milwaukee Area Technical College where he received a degree in Information Systems Security and is an active member of its IT Security advisory board.

Faculty Member Keri Chisolm

Keri Chisolm

Cybersecurity Advisor for FedEx Services

Keri Chisolm has been working in Information Security for over 20 years. She began her security career as a staff member at the Center for Computer Security Research with the Computer Science and Engineering Department at Mississippi State University. As the security program at Mississippi State University grew, she also worked with the National Forensics Training Center and the Critical Infrastructure Protection Center. In addition to these roles, she also served as the systems administrator for the department where she supported numerous educational, production, and research systems. Later she joined the Information Security Team at FedEx where she worked for 3 years in Identity and Access Management with a particular focus on federated identities. In her current role with FedEx, she has joined the Cloud Security team with a focus on securing large IaaS and PaaS cloud offerings. Keri has earned her CISSP and CCSK certifications as well as multiple platform specific certifications. In her free time, she enjoys traveling, studying history, spending time with family, and attending sporting events.

What Our Participants Are Saying

"The topics on cryptography and penetration testing were the best parts of the program for me. These are the areas that I lacked confidence in, and this program has given me the baseline knowledge to advance to the next stage in my career."

— Mark Hughes, Integration Manager, QTS Global

"The content presented by the professors was the best part of the program for me. It's all relevant to what we are currently facing, and it can be applied to any organization."

— Euclides Garcia, Global IT Director, Infrastructure and Security, Del Monte Fresh Produce

"The availability and accessibility of the program were the best parts. I loved being able to do the course at any time during the week rather than set times. The material was very informative and helped strengthen my skills in the field."

— Allison Hamm, SOC Analyst, Solutions Granted Inc.

"The vast number of case studies gave me a more in-depth view into cybersecurity and its risks."

— Berndt Pilgram, Principal Lead of IT Systems and Data Science, Infineon Technologies

"The program roadmap was the best part of the program for me because the lessons were structured in a way that made learning each week’s lessons interconnected to each other in an intuitive way."

— Richard Napalan, FC Associate, Amazon

Certificate

Certificate

Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants and 36 Continuing Education Units (CEUs). This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

Download Brochure

After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, in the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

FAQs

  • How do I know whether this program is right for me?

    After reviewing the information on the program landing page, we recommend you submit the short form above to gain access to the program brochure, which includes more in-depth information. If you still have questions on whether this program is a good fit for you, please email learner.success@emeritus.org, and a dedicated program advisor will follow up with you very shortly.


    Are there any prerequisites for this program?

    Some programs do have prerequisites, particularly the more technical ones. This information will be noted on the program landing page and in the program brochure. If you are uncertain about program prerequisites and your capabilities, please email us at learner.success@emeritus.org for assistance.


    What are the requirements to earn a certificate?

    This is a graded program. You must complete a combination of individual assignments, quizzes, and a final project. Each component carries a certain number of points, and a cumulative score of 75 percent is required to pass and obtain your professional certificate.


    Will I be guaranteed a job upon completion of the program?

    The primary objective of this program is to give you the skills you need to be prepared for a job in this field. While eligible participants will receive career coaching and support and may receive introductions to our hiring partners, job placement is not guaranteed.

  • How much time will I be expected to devote to this program?

    Each program includes an estimated learner effort per week. This is referenced at the top of the program landing page under the “Duration” section and in the program brochure, which you can obtain by submitting the short form at the top of this web page.


    How will I spend my time in this program?

    You will divide your learning time between viewing recorded coding demos, and video lectures, contributing to class discussions, completing assignments, projects, and knowledge checks, and attending optional weekly live sessions with industry experts and program leaders.


    How is the program administered? Can the program be accessed any time?

    The program is accessed through the custom learning portal. This portal will give you access to all program-related content such as video lectures, assignments, and discussions. Live office hours will be conducted using a webinar tool.

    The video lectures and assignments are accessible weekly throughout the program. In the event you miss a live session, a recording will be made available.


    Do I need to attend live sessions every week?

    Faculty video lectures are recorded, allowing you to watch these on your own schedule. However, participation in optional live weekly live sessions and discussion boards is highly encouraged. Live sessions will give you the opportunity to draw on the coding experience of our industry-experienced program leaders to answer your questions and help reach your learning goals. The discussion boards are also an integral part of the learning experience, giving you and your peers the opportunity to learn together and receive guidance from the moderators.


    Can I download the program videos?

    You can download video transcripts, assignment templates, readings, etc. However, the video lectures are only available for streaming and require an internet connection.


    How do I interact with other program participants?

    You can communicate with other participants through our learning platform. You will be able to form groups based on your interests and location. A direct messaging feature is also available through the platform.


    What is it like to learn online with the learning collaborator, Emeritus?

    More than 300,000 learners across 200 countries have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded.

    All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner the cost of which is already included in the overall course fee of the course.

    A dedicated program support team is available 24/5 (Monday to Friday) to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.

  • What are the requirements to earn the certificate?

    Each program includes an estimated learner effort per week, so you can gauge what is required before you enroll. This is referenced at the top of the program landing page under the “Duration” section and in the program brochure, which you can obtain by submitting the short form at the top of this web page. All programs are designed to fit into your working life.

    This program is scored as a pass or no-pass; participants must complete the required activities to pass and obtain the certificate of completion. Some programs include a final project submission or other assignments to obtain passing status. This information will be noted in the program brochure. Please contact us at learner.success@emeritus.org if you need further clarification of any specific program requirements.


    What type of certificate will I receive?

    Upon successful completion of the program, you will receive a smart digital certificate. The smart digital certificate can be shared with friends, family, schools, or potential employers. You can use it on your cover letter, résumé, and/or display it on your LinkedIn profile.

    The digital certificate will be sent approximately two weeks after the program, once grading is complete.


    Can I get the hard copy of the certificate?

    No, only verified digital certificates will be issued upon successful completion. This allows you to share your credentials on social platforms such as LinkedIn, Facebook, and Twitter.


    Do I receive alumni status after completing this program?

    No, there is no alumni status granted for this program. In some cases, there are credits that count toward a higher level of certification. This information will be clearly noted in the program brochure.


    How long will I have access to the learning materials?

    You will have access to the learning platform and all program materials (videos excluded) for one full year following the program end date. Access to the learning platform is restricted to registered participants per the terms of agreement.

  • What equipment is needed or the technical requirements for this program?

    To successfully complete this course/program(me) online, you must have access to a device meeting the minimum requirements, found here. In addition, Microsoft Office or similar product and a PDF viewer are required to access documents, spreadsheets, presentations, PDF files, and transcripts in all programs. Technical programs might have additional tech requirements. Please check the learning platform on the first day of class.


    Do I need to be online to access the program content?

    Yes, the learning platform is accessed via the internet and video content is not available for download. You can download files of video transcripts, assignment templates, readings, etc. Video lectures must be streamed via the internet and webinars and small group sessions will require an internet connection.

  • What is the program fee for the program, and what forms of payment do you accept?

    The program fee is shown at the top of this page and payment must be made in US dollars only.

    Flexible payment options, group enrollment benefits, and referral bonus are available.

    Tuition assistance may be available for participants who qualify. Please contact your program advisor to discuss.


    What if I don’t have a credit card? Is there another mode of payment accepted?

    Yes, you can do the bank remittance in USD via wire transfer. Please contact your program advisor for more details.


    Is there an option to make flexible payments for this program?

    Yes flexible payment options are available for this program. We partner with loan providers to offer you flexible and transparent loan options. More information about loan financing is available here. Installment payments are also available—; you can find the options here.


    Does the program fee include taxes? Are there any additional fees?

    Yes, the program fee is inclusive of any taxes with the exception of GST for Singapore residents.

  • What is your refund policy?

    After a participant has withdrawn, they will no longer be able to attend live sessions or 1:1 sessions with course leaders, mentors, or career coaches; submit work for review; or access their programme dashboard or curriculum.


    Time of Refund Request

    • Within 21 days after course commencement
    • 22 to 45 days after course commencement
    • More than 45 days after course commencement

    Amount Refunded

    • Full refund of course fee (assuming no prior course deferral)
    • 50% of course fee (assuming no prior course deferral)
    • No refund of course fee

    How do I request a refund?

    Participants who would like to cancel their enrollment should email ProgramSupport@Emeritus.org or visit the “Support” tab in the learning platform to obtain a copy of the Withdrawal Request Form. This form must be submitted by midnight UTC of the last day of the trial period to be eligible for a full refund. No cancellations will be processed unless this form is received. Refunds will be issued within 30 days after the effective date of withdrawal or dismissal.


    Can I defer to a future cohort?

    Participants have the option to request a deferral to a future cohort within the first 30 days from their program start date. Cohort changes may be made only once per enrollment and are subject to the availability of cohorts and scheduled at the discretion of Emeritus. Participants requesting a deferral must be in good academic standing. Participants who would like to defer their enrollment should email ProgramSupport@Emeritus.org or visit the “Support” tab in the learning platform to obtain a copy of the Deferral Request Form.

Financing Options

We offer flexible and transparent payment options through our partners—Climb Credit, Sallie Mae, Ascent Funding, and Knoma.

US Residents

CLIMB CREDIT

SALLIE MAE*

*At the time of loan application, please select 'Student, Career training school' when prompted.


ASCENT FUNDING

UK Residents

KNOMA

Flexible Payment Options For All

Flexible Payment Options

  • Monthly payments as low as US$1,166
    Choose to pay in two, three, or six monthly installments for higher flexibility Click here to know more.

You can opt for any one of the financing options to cover up to the full cost of the program tuition. If you are considering financing your program through one of our partners, the enrollment process can only be completed with the assistance of your program advisor.

Please note that loan applications should be submitted no later than four business days prior to the enrollment deadline due to processing time.

Apply Now

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available. Learn more.