Professional Certificate in Cybersecurity

Accelerate your career in cybersecurity in 24 weeks, online

Apply Now

Get Your Brochure

Course Dates

STARTS ON

April 30, 2024

Course Duration

DURATION

24 weeks, online
15–20 hours per week

Course Fee

PROGRAM FEE

US$7,650

Explore financing options available for this program.
Learn More

Advance Your Career in Cybersecurity with MIT xPRO

Cyberattacks are becoming more frequent, complex, and targeted, collectively costing organizations billions of dollars every year. This is why cybersecurity is one of the fastest growing industries in the US, as every year more companies and government agencies seek to hire cybersecurity professionals with the specialized technical skills needed to defend mission-critical computer systems, networks, and cloud applications, against cyberattacks.

Enroll today in the MIT xPRO Professional Certificate in Cybersecurity program, which focuses on both defensive and offensive aspects of the technology. It also includes personalized feedback from program leaders, insights from guest speakers, career coaching, mentorship, and the opportunity to create a capstone project on network development to use for a job portfolio.

Take the next step to advance your career with the MIT xPRO Professional Certificate in Cybersecurity program.

$403 Billion

The projected value of the cybersecurity market through 2027

Source: Forbes

600,000

The number of unfilled cybersecurity positions in the US in 2022

Source: Bloomberg

Who Is This Program For?

This program is a career accelerator for those who want to learn the essentials of cybersecurity from MIT faculty.

  • Career Launchers: Early-career IT professionals, network engineers, and system administrators wanting to gain a comprehensive overview of cybersecurity and prepare themselves for continued career progression in this high-growth field.
  • Career Builders: IT project managers and engineers wanting to gain the ability to think critically about the threat landscape including vulnerabilities in cybersecurity, to better understand what kind of cybersecurity to specialize in, and upgrade their own resume for career advancement
  • Career Switchers: Mid- or later-career professionals currently working outside of cybersecurity wanting to add critical cybersecurity knowledge and foundational lessons to their resume as they begin considering a career change to an in-demand field.
Download Brochure

Program Frameworks

MITRE ATT&CK®

The MITRE ATT&CK knowledge base is explored deeper in the offensive and defensive aspects of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the defensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.

National Institute of Standards and Technology (NIST) Framework

The NIST CSF framework is threaded throughout the entire program. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

Section Summaries

Decorative image relating to text that follows

Section 1: Introduction to Cybersecurity

The first eight weeks of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and identity and access management (IAM).

Decorative image relating to text that follows

Section 2: Defensive Cybersecurity

The second set of eight weeks focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.

Decorative image relating to text that follows

Section 3: Offensive Cybersecurity

The final set of eight weeks addresses the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.

Program Highlights

Decorative image relating to text that follows

Earn a certificate and 36 Continuing Education Units (CEUs) from MIT xPRO

Decorative image relating to text that follows

Insights and case studies from renowned MIT faculty

Decorative image relating to text that follows

Foundational cybersecurity knowledge

Decorative image relating to text that follows

Completion of a capstone presentation to share with potential employers

Decorative image relating to text that follows

A great foundation towards a degree or certification in cybersecurity

Program Topics

Whether you are just starting your IT career or expanding into an adjacent field, this comprehensive program will equip you with the foundational knowledge needed to succeed in the field of cybersecurity. This 24-week program includes the following modules:

Week 1:

Introduction to Cybersecurity Risk Management

Week 2:

Cybersecurity Foundation Concepts

Week 3:

Federal Government Role: Law, Operations, and Standards

Week 4:

Threats and Vulnerabilities

Week 5:

Cybersecurity for Critical Urban Infrastructure

Week 6:

Identity and Access Management (IAM) Concepts

Week 7:

IAM Layers and Technology

Week 8:

Preparing for a Job in Cybersecurity Risk Management

Week 9:

Introduction to Defensive Cybersecurity

Week 10:

Cryptography

Week 11:

Security Operations Center (SOC)

Week 12:

Incident Response (IR)

Week 13:

Secure Systems Administration

Week 14:

Secure Network Administration

Week 15:

Cloud Security

Week 16:

Preparing for a Job in Cybersecurity Operations

Week 17:

Introduction to Offensive Cybersecurity

Week 18:

Penetration Testing Part 1

Week 19:

Penetration Testing Part 2

Week 20:

Social Engineering

Week 21:

Artificial Intelligence

Week 22:

Policy and Privacy, Regulation, and Data Governance

Week 23:

OT and IoT Risk

Week 24:

Preparing for a Job in Offensive Cybersecurity Operations

Week 1:

Introduction to Cybersecurity Risk Management

Week 13:

Secure Systems Administration

Week 2:

Cybersecurity Foundation Concepts

Week 14:

Secure Network Administration

Week 3:

Federal Government Role: Law, Operations, and Standards

Week 15:

Cloud Security

Week 4:

Threats and Vulnerabilities

Week 16:

Preparing for a Job in Cybersecurity Operations

Week 5:

Cybersecurity for Critical Urban Infrastructure

Week 17:

Introduction to Offensive Cybersecurity

Week 6:

Identity and Access Management (IAM) Concepts

Week 18:

Penetration Testing Part 1

Week 7:

IAM Layers and Technology

Week 19:

Penetration Testing Part 2

Week 8:

Preparing for a Job in Cybersecurity Risk Management

Week 20:

Social Engineering

Week 9:

Introduction to Defensive Cybersecurity

Week 21:

Artificial Intelligence

Week 10:

Cryptography

Week 22:

Policy and Privacy, Regulation, and Data Governance

Week 11:

Security Operations Center (SOC)

Week 23:

OT and IoT Risk

Week 12:

Incident Response (IR)

Week 24:

Preparing for a Job in Offensive Cybersecurity Operations
Download Brochure

Career Preparation and Guidance

Stepping into a career in cybersecurity requires a variety of skills, both hard and soft. This program offers guidance in navigating a career path in tech, including crafting your elevator pitch and providing communication tips. These services are provided by Emeritus, our learning collaborator for this program. The program support team includes course leaders who help you reach your learning goals and career coaches to guide you through your job search. The program offers career preparation and guidance, however, job placement is not guaranteed.

Emeritus provides the following career preparation services:

  • Crafting your elevator pitch
  • LinkedIn profile guidance
  • Resume/cover letters
  • Navigating your job search
  • Interview tips and preparation
  • Negotiating salary

Career exercises focused on launching a career in cybersecurity include:

  • Job searching and interviewing for cybersecurity positions
  • Building your personal brand and promoting your skills
  • Communicating cybersecurity concepts through presentation skills

Program Instructors

Faculty Member Keri Pearlson

Keri Pearlson

Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of the Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's Research Board, CSC,.. More info

Faculty Member Nickolai Zeldovich

Nickolai Zeldovich

Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008... More info

Faculty Member Stuart Madnick

Stuart Madnick

John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus, at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity... More info

Faculty Member Danny Weitzner

Danny Weitzner

3Com Founders Principal Research Scientist Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Prof. Weitzner is founding director of the MIT internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of accountable systems to enable computational treatment of legal rules... More info

Faculty Member Larry Susskind

Larry Susskind

Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making... More info

Faculty Member Una-May O'Reilly

Una-May O'Reilly

Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL

Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting tools and cyber arms race models... More info

Faculty Member Barbara Johnson

Barbara Johnson

Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)² Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI

Securing information systems is Barbara’s purpose and educating security professionals is her passion. Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for the government, automotive, entertainment, financial, and travel sectors... More info

Faculty Member Rajiv Shridhar

Rajiv Shridhar

Information Security Officer and Director of Research Computing, MIT Sloan School of Management

Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students and collaborators by providing specialized computing infrastructure, data sets, software tools... More info

Faculty Member Howard Shrobe

Howard Shrobe

Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts

Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL initiative... More info

Guest Speakers

Faculty Member Caren Shiozaki

Caren Shiozaki

EVP-CIO for TMST, Inc., New Mexico. Vice Chair for SIM and Founder of the SIM Cybersecurity SIG

Caren Shiozaki is EVP-CIO for TMST, Inc., a mortgage organization in Santa Fe, New Mexico. She is also a Senior Fellow with the DivIHN Center of Excellence for digital security and risk. Previously she was CIO for a Dallas-based media organization. She has worked internationally for Bank of America and American Express. Caren is Chair Emeritus for SIM's National Board and co-founder of the national Digital Risk SIG. She is board chair for the Santa Fe Alliance for Science and the Santa Fe Animal Shelter. She holds professional certifications in corporate governance and data privacy and is a certified e-discovery specialist. She holds a degree in genetics from UC Berkeley.

Faculty Member Erica Wilson

Erica Wilson

CISO for Cass Information Systems

Erica Wilson has over 20 years of IT experience, 18 of which are in the field of cybersecurity. Erica currently serves as the CISO for Cass Information Systems. She has responsibility for all aspects of the company’s cybersecurity program, including security strategy, policies and procedures, technologies, and training. In addition, Erica leads all aspects of technology risk management, including compliance with internal and regulatory controls as well as the Business Continuity Program. Erica also has a passion for STEM education. Throughout her professional career, she has consistently identified ways to influence and encourage others in the community to explore opportunities to work in the field of information technology and cybersecurity. In this program.

Faculty Member Ion Santotomas

Ion Santotomas

Lead Security Analyst at Schneider Electric

Ion is a diligent senior cybersecurity professional with a strong technical background in systems engineering and infrastructure management. Ion is passionate about both offensive and defensive aspects of cybersecurity and actively participates in events, conferences, and online challenges to sharpen his technical skills and knowledge about the latest trends and attack vectors in order to become a better defender.

Faculty Member Daniel Gorecki

Daniel Gorecki

Group Information Security Manager & CISO at Ascot Group

Daniel Gorecki is a Group Information Security Manager and CISO at Ascot Group. In this role he manages a global team for information risk management and cyber resiliency for the global organization. Prior to joining Ascot Group, he was the CISO at Aramark and held the CISO and CIO roles at Intercept Pharmaceuticals. Dan maintains the certification for Certified Information Systems Security Professional (CISSP), Certified Data Privacy Solutions Engineer (CDPSE), has completed SIM's Regional Leadership Forum for IT Executives, and holds a B.E. in Computer Engineering from Stony Brook University.

Faculty Member Josh Schwartz

Josh Schwartz

Senior Director of Technical Security for The Paranoids, the Information Security Team at Yahoo

Josh Schwartz is the Senior Director of Technical Security for The Paranoids, the information security team at Yahoo, where he oversees an organization focused on offensive security assessments, red team methodology, and building products that support security culture and behavioral change initiatives.

Faculty Member Matthew Lange

Matthew Lange

Assistant Director of the Adversarial Security Testing team at Northwestern Mutual

Matt Lange is currently the Assistant Director of the Adversarial Security Testing team at Northwestern Mutual where he leads a team of offensive security professionals accountable for penetration testing, red teaming, and purple teaming. He began his career in cybersecurity as an incident responder and forensic analyst. He quickly transitioned to penetration testing and red teaming where he helped build those programs from scratch. Matt graduated from the University of Wisconsin where he double majored in Mandarin Chinese and East Asian Politics, as well as Milwaukee Area Technical College where he received a degree in Information Systems Security and is an active member of its IT Security advisory board.

Faculty Member Keri Chisolm

Keri Chisolm

Cybersecurity Advisor for FedEx Services

Keri Chisolm has been working in Information Security for over 20 years. She began her security career as a staff member at the Center for Computer Security Research with the Computer Science and Engineering Department at Mississippi State University. As the security program at Mississippi State University grew, she also worked with the National Forensics Training Center and the Critical Infrastructure Protection Center. In addition to these roles, she also served as the systems administrator for the department where she supported numerous educational, production, and research systems. Later she joined the Information Security Team at FedEx where she worked for 3 years in Identity and Access Management with a particular focus on federated identities. In her current role with FedEx, she has joined the Cloud Security team with a focus on securing large IaaS and PaaS cloud offerings. Keri has earned her CISSP and CCSK certifications as well as multiple platform specific certifications. In her free time, she enjoys traveling, studying history, spending time with family, and attending sporting events.

What Our Participants Are Saying

"The topics on cryptography and penetration testing were the best parts of the program for me. These are the areas that I lacked confidence in, and this program has given me the baseline knowledge to advance to the next stage in my career."

— Mark Hughes, Integration Manager, QTS Global

"The content presented by the professors was the best part of the program for me. It's all relevant to what we are currently facing, and it can be applied to any organization."

— Euclides Garcia, Global IT Director, Infrastructure and Security, Del Monte Fresh Produce

"The availability and accessibility of the program were the best parts. I loved being able to do the course at any time during the week rather than set times. The material was very informative and helped strengthen my skills in the field."

— Allison Hamm, SOC Analyst, Solutions Granted Inc.

"The vast number of case studies gave me a more in-depth view into cybersecurity and its risks."

— Berndt Pilgram, Principal Lead of IT Systems and Data Science, Infineon Technologies

"The program roadmap was the best part of the program for me because the lessons were structured in a way that made learning each week’s lessons interconnected to each other in an intuitive way."

— Richard Napalan, FC Associate, Amazon

Certificate

Certificate

Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants and 36 Continuing Education Units (CEUs). This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

Download Brochure

After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, in the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

FAQs

  • How do I know whether this program is right for me?

    After reviewing the information on the program landing page, we recommend you submit the short form above to gain access to the program brochure, which includes more in-depth information. If you still have questions on whether this program is a good fit for you, please email learner.success@emeritus.org, and a dedicated program advisor will follow up with you very shortly.


    Are there any prerequisites for this program?

    Some programs do have prerequisites, particularly the more technical ones. This information will be noted on the program landing page and in the program brochure. If you are uncertain about program prerequisites and your capabilities, please email us at learner.success@emeritus.org for assistance.


    What are the requirements to earn a certificate?

    This is a graded program. You must complete a combination of individual assignments, quizzes, and a final project. Each component carries a certain number of points, and a cumulative score of 75 percent is required to pass and obtain your professional certificate.


    Will I be guaranteed a job upon completion of the program?

    The primary objective of this program is to give you the skills you need to be prepared for a job in this field. While eligible participants will receive career coaching and support and may receive introductions to our hiring partners, job placement is not guaranteed.

  • How much time will I be expected to devote to this program?

    Each program includes an estimated learner effort per week. This is referenced at the top of the program landing page under the “Duration” section and in the program brochure, which you can obtain by submitting the short form at the top of this web page.


    How will I spend my time in this program?

    You will divide your learning time between viewing recorded coding demos, and video lectures, contributing to class discussions, completing assignments, projects, and knowledge checks, and attending optional live sessions with industry experts and program leaders.


    How is the program administered? Can the program be accessed any time?

    The program is accessed through the custom learning portal. This portal will give you access to all program-related content such as video lectures, assignments, and discussions. Live office hours will be conducted using a webinar tool.

    The video lectures and assignments are accessible weekly throughout the program. In the event you miss a live session, a recording will be made available.


    Do I need to attend live sessions every week?

    Faculty video lectures are recorded, allowing you to watch these on your own schedule. However, participation in optional live sessions and discussion boards is highly encouraged. Live sessions will give you the opportunity to draw on the coding experience of our industry-experienced program leaders to answer your questions and help reach your learning goals. The discussion boards are also an integral part of the learning experience, giving you and your peers the opportunity to learn together and receive guidance from the moderators.


    Can I download the program videos?

    You can download video transcripts, assignment templates, readings, etc. However, the video lectures are only available for streaming and require an internet connection.


    How do I interact with other program participants?

    You can communicate with other participants through our learning platform. You will be able to form groups based on your interests and location. A direct messaging feature is also available through the platform.


    What is it like to learn online with the learning collaborator, Emeritus?

    More than 300,000 learners across 200 countries have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded.

    All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner the cost of which is already included in the overall course fee of the course.

    A dedicated program support team is available 24/5 (Monday to Friday) to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.


    What is the relationship between Emeritus and MIT xPRO?

    Emeritus and MIT xPRO collaborate to create and deliver educational programs. None of these programs are Title IV-eligible.

  • What are the requirements to earn the certificate?

    Each program includes an estimated learner effort per week, so you can gauge what is required before you enroll. This is referenced at the top of the program landing page under the “Duration” section and in the program brochure, which you can obtain by submitting the short form at the top of this web page. All programs are designed to fit into your working life.

    This program is scored as a pass or no-pass; participants must complete the required activities to pass and obtain the certificate of completion. Some programs include a final project submission or other assignments to obtain passing status. This information will be noted in the program brochure. Please contact us at learner.success@emeritus.org if you need further clarification of any specific program requirements.


    What type of certificate will I receive?

    Upon successful completion of the program, you will receive a smart digital certificate. The smart digital certificate can be shared with friends, family, schools, or potential employers. You can use it on your cover letter, résumé, and/or display it on your LinkedIn profile.

    The digital certificate will be sent approximately two weeks after the program, once grading is complete.


    Can I get the hard copy of the certificate?

    No, only verified digital certificates will be issued upon successful completion. This allows you to share your credentials on social platforms such as LinkedIn, Facebook, and Twitter.


    Do I receive alumni status after completing this program?

    No, there is no alumni status granted for this program. In some cases, there are credits that count toward a higher level of certification. This information will be clearly noted in the program brochure.


    How long will I have access to the learning materials?

    You will have access to the learning platform and all program materials (videos excluded) for one full year following the program end date. Access to the learning platform is restricted to registered participants per the terms of agreement.

  • What equipment is needed or the technical requirements for this program?

    To successfully complete this course/program(me) online, you must have access to a device meeting the minimum requirements, found here. In addition, Microsoft Office or similar product and a PDF viewer are required to access documents, spreadsheets, presentations, PDF files, and transcripts in all programs. Technical programs might have additional tech requirements. Please check the learning platform on the first day of class.


    Do I need to be online to access the program content?

    Yes, the learning platform is accessed via the internet and video content is not available for download. You can download files of video transcripts, assignment templates, readings, etc. Video lectures must be streamed via the internet and webinars and small group sessions will require an internet connection.

  • What is the program fee for the program, and what forms of payment do you accept?

    The program fee is shown at the top of this page and payment must be made in US dollars only.

    Flexible payment options, group enrollment benefits, and referral bonus are available.

    Tuition assistance may be available for participants who qualify. Please contact your program advisor to discuss.


    What if I don’t have a credit card? Is there another mode of payment accepted?

    Yes, you can do the bank remittance in USD via wire transfer. Please contact your program advisor for more details.


    Is there an option to make flexible payments for this program?

    Yes flexible payment options are available for this program. We partner with loan providers to offer you flexible and transparent loan options. More information about loan financing is available here. Installment payments are also available—; you can find the options here.


    Does the program fee include taxes? Are there any additional fees?

    Yes, the program fee is inclusive of any taxes with the exception of GST for Singapore residents.


    Who will be collecting the payment for the program?

    Emeritus collects all program payments, provides learner enrollment and program support, and manages learning platform services.

  • What is the program refund and deferral policy?

    For the program refund and deferral policy, please click the link here.

Financing Options

We offer several options to help you afford tuition for the Professional Certificate in Cybersecurity Program.

Available opportunities to lower tuition fees include:
Referrals – You and a colleague can each receive $765 off your tuition when you enroll together. Refer now
Group enrollments – A discount of up to 20% is available for group enrollments. For more information, email group-enrollments@emeritus.org

US Residents

SALLIE MAE*

*At the time of loan application, please select ‘Undergraduate students’ when prompted.

CLIMB CREDIT

Flexible Payment Options

Flexible Payment Options

  • Monthly payments as low as US$1,406
    Choose to pay in two, three, or six monthly installments for higher flexibility Click here to know more.

You can opt for any one of the financing options to cover up to the full cost of the program tuition. If you are considering financing your program through one of our partners, the enrollment process can only be completed with the assistance of your program advisor.

Please note that loan applications should be submitted no later than four business days prior to the enrollment deadline due to processing time.

    What is Sallie Mae?

    Sallie Mae is one of the largest private student loan lenders in the industry.

    What is the process to apply for a loan?

    Once you’ve applied for your program, you can then apply for a loan with Sallie Mae. When approved, you’ll choose your interest rate and your repayment option and sign the loan documents. The lender will send the tuition directly to your school.

    How long will it take until I get a decision?

    You can receive a credit result is as few as 15 minutes.

    Do I need a cosigner?

    If you don’t have a credit history, you will need a cosigner for your loan. A cosigner can be a parent, relative, or any other creditworthy individual. Their good credit history may help you get a loan.

    If my application is accepted, am I committed to using the financing?

    After your loan is approved, you are required to sign the loan terms. Your loan is not confirmed without this signature. You have the right to cancel your private student loan as described in the Final Loan Disclosure before funds are disbursed to your school.

    What are the terms of the loan?

    You can choose between fixed and variable interest for your loan. You can also choose one of three repayment options: Deferred Repayment, Fixed Repayment, and Interest Repayment.

    When does loan payback begin?

    You can make your first payment about one month after your program starts (fixed repayment or interest repayment) or six months after your program ends (deferred repayment).

    How long will I be making payments?

    Most loans have a 10-year standard repayment. When you apply for the loan, you will be given more information on the repayment plan.

    How do I find out how much my monthly payment is?

    You can find your monthly payment on the Monthly Payment Calculator here.

    Are there any circumstances that would allow me to put my loan payments on hold?

    Delinquency occurs when you fail to pay all or part of your monthly student loan payment. You could be eligible for a student loan deferment, which would allow you to temporarily reduce or postpone payments on your student loans in special circumstances.

    Can I pay off my loan early?

    There is no penalty for paying your loan off early or paying extra throughout the life of your loan. You have the flexibility to make early payments of fully pay off your loan without prepayment fees.

    What is Climb Credit?

    Climb Credit is a new kind of student lender.

    Climb believes education is an investment and should be treated that way — we partner with schools offering career-focused education, and then provide accessible and affordable loans to attend these schools.

    What is the process to apply for a loan?

    Simply type your school's name into the search bar after clicking "Apply now" to find a link to the application page. From there, you'll be able to complete our short online application.

    You may also have received a link to apply for a Climb loan from your school’s admissions team, or you can find the link on your school’s website or Climb's website. Apply using your laptop, tablet, or phone.

    You'll want to make sure you fill out an application for the specific school and program you'll be attending. We link our loans to each course, so your school will know you've been approved for a loan with us and that we'll be sending your tuition to them.

    How long will it take until I get a decision?

    On average, 4:01 minutes — and just applying will not impact your credit score. We know that your time is valuable, so we’ve kept our application as short as possible.

    Do I need a cosigner?

    No. Climb only fund loans for students who are attending the program. The program attendee should always be the primary borrower on the application.

    During your application, you will have the option to add a co-borrower. If you have a co-borrower with a better credit score that you, adding them to your loan application can potentially help you get approved and/or receive a lower interest rate offer.

    If my application is accepted, am I committed to using the financing?

    No. Applying for Climb financing is free and comes and carries no commitment until you accept and finalize the loan. The initial application will not affect your credit score, and you are free to decline your loan offer if you change your mind about financing.

    What are the terms of the loan?

    To view the equation used to calculate your interest and monthly payments, check out this article HERE!

    When does loan payback begin?

    Depending on your program, we may offer loans with either an initial interest-only period while in class and for a few months after, a full deferral period while in class and for a few months after, or immediate full repayment.

    For loans with an interest-only period or immediate full repayment, your first payment is due one month after your loan is funded.

    How long will I be making payments?

    Climb's standard loan tenor is 36 months, but you can pay any time before that, as there is no pre-payment penalty. You can repay your 3-year loan in 3 years or in 1 day.

    Climb's goal is to make sure that your monthly payments stay low and affordable, which is why we give you the option to choose your term length when you apply.

    Master’s students can choose between a 2-year or a 3-year repayment term.

    Doctoral students can choose between a 4-year or a 5-year repayment term.

    How do I find out how much my monthly payment is?

    This amount is mentioned in your loan agreement.

    Are there any circumstances that would allow me to put my loan payments on hold?

    In order not to fall behind on your Climb loan payments, you can request a deferral of payments on your loan. A deferment will allow you to temporarily reduce your monthly loan payment amount.

    Can I pay off my loan early?

    Absolutely! You can pre-pay your loan, in whole or in part, at any time with no penalties.

Apply Now

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available. Learn more.