EXECUTIVE EDUCATION

Professional Certificate in Cybersecurity

Get Your Brochure

Course Dates

STARTS ON

September 9, 2021

Course Duration

DURATION

24 weeks, online
15–20 hours per week

Course Duration

Advance Your Career as a Cybersecurity Engineer With MIT xPRO

Cyberattacks are becoming more frequent, complex, and targeted, collectively costing organizations billions of dollars every year. This is why cybersecurity is one of the fastest growing industries in the U.S. as every year more companies and government agencies are seeking to hire cybersecurity engineers with the specialized technical skills needed to defend mission-critical computer systems, networks, cloud applications, and more against cyberattacks.

Now there's an easier way to acquire this versatile skill set that so many employers are seeking. Enroll today in the MIT xPRO Professional Certificate in Cybersecurity program, which focuses on both the defensive and offensive aspects of the technology. It also includes personalized feedback from course leaders, insights from guest speakers, career coaching, mentorship, and the opportunity to create a capstone network development project for a job portfolio.

Take the next step to advance your career with the MIT xPRO Professional Certificate in Cybersecurity program.

USD 141,751

The average senior cybersecurity engineer’s salary in the United States

Source: salary.com, March, 2021

15%

Projected annual growth rate for the cybersecurity market through 2026

Source: Modor Intelligence, 2020

338K+

Unique job postings in the U.S. requiring cybersecurity as a skill between March 2020 and March 2021

Source: EMSI Data, 2021

Who Is This Program For?

This course is a career accelerator for those who want to learn the fundamentals of cybersecurity engineering from MIT faculty.

  • Early-career IT professionals, network engineers, and systems administrators wanting to specialize in cybersecurity as a way to move up in a high-growth field with high-demand job opportunities.
  • IT project managers and engineering managers who want to improve their organization's preparedness and response against cyberattacks and grow their career as leaders in cybersecurity strategies.
  • Mid- or later-career IT professionals looking to switch to cybersecurity as a specialty to refresh their career and take advantage of the demand for cybersecurity talent.

Program Frameworks

National Institute of Standards and Technology (NIST) Framework

The NIST framework is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

The CSA Cloud Controls Matrix framework includes domains covering the aspects of cloud technology.

MITRE ATT&CK®

The MITRE ATT&CK® knowledge base contains adversary tactics and techniques which are utilized as the foundational development of specific threat models and methodologies.

Program Highlights

Decorative image relating to text that follows

A certificate from MIT xPRO to recognize your skills and success

Decorative image relating to text that follows

Insights and case studies from renowned MIT faculty

Decorative image relating to text that follows

Market-ready cybersecurity skills for a high-growth market

Decorative image relating to text that follows

Completion of a capstone presentation to share with potential employers

Decorative image relating to text that follows

Develop a strong foundation for industry certifications such as CompTIASecurity and CISSP

Program Topics

This program is organized into three main sections: Introduction to Cybersecurity, Defensive Cybersecurity, and Offensive Cybersecurity. Whether you are just starting your IT career or expanding into a new specialty, this comprehensive program will equip you with the skills needed to excel in the field of cybersecurity. This 24-week program includes the following modules:

Week 1:

Introduction to Cybersecurity Risk Management

Week 2:

Cybersecurity Foundation Concepts

Week 3:

Federal Government Role: Law, Operations, and Standards

Week 4:

Threats and Vulnerabilities

Week 5:

Cybersecurity for Critical Urban Infrastructure

Week 6:

Identity and Access Management (IAM) Concepts

Week 7:

IAM Layers and Technology

Week 8:

Preparing for a Job in Cybersecurity Risk Management

Week 9:

Introduction to Defense and Network Administration

Week 10:

Cryptography

Week 11:

Security Operations Center (SOC)

Week 12:

Incident Response (IR)

Week 13:

Secure Systems Administration

Week 14:

Secure Network Administration

Week 15:

Cloud Security

Week 16:

Preparing for a Job in Cybersecurity Operations

Week 17:

Introduction to Offensive Cybersecurity

Week 18:

Penetration Testing, Part 1

Week 19:

Penetration Testing, Part 2

Week 20:

Social Engineering

Week 21:

Artificial Intelligence

Week 22:

Policy and Privacy, Regulation, and Data Governance

Week 23:

OT and IoT Risk

Week 24:

Preparing for a Job in Offensive Cybersecurity Operations

Week 1:

Introduction to Cybersecurity Risk Management

Week 13:

Secure Systems Administration

Week 2:

Cybersecurity Foundation Concepts

Week 14:

Secure Network Administration

Week 3:

Federal Government Role: Law, Operations, and Standards

Week 15:

Cloud Security

Week 4:

Threats and Vulnerabilities

Week 16:

Preparing for a Job in Cybersecurity Operations

Week 5:

Cybersecurity for Critical Urban Infrastructure

Week 17:

Introduction to Offensive Cybersecurity

Week 6:

Identity and Access Management (IAM) Concepts

Week 18:

Penetration Testing, Part 1

Week 7:

IAM Layers and Technology

Week 19:

Penetration Testing, Part 2

Week 8:

Preparing for a Job in Cybersecurity Risk Management

Week 20:

Social Engineering

Week 9:

Introduction to Defense and Network Administration

Week 21:

Artificial Intelligence

Week 10:

Cryptography

Week 22:

Policy and Privacy, Regulation, and Data Governance

Week 11:

Security Operations Center (SOC)

Week 23:

OT and IoT Risk

Week 12:

Incident Response (IR)

Week 24:

Preparing for a Job in Offensive Cybersecurity Operations
Download Brochure

Program Faculty

Keri Pearlson

Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of the Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's Research Board, CSC, and AT&T... More info

Faculty Member Nickolai Zeldovich

Nickolai Zeldovich

Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008. More info

Faculty Member Stuart Madnick

Stuart Madnick

John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus, at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity... More info

Faculty Member Danny Weitzner

Danny Weitzner

3Com Founders Principal Research Scientist Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Prof. Weitzner is founding director of the MIT internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of accountable systems to enable computational treatment of legal rules. More info

Faculty Member Larry Susskind

Larry Susskind

Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making... More info

Faculty Member Una-May O'Reilly

Una-May O'Reilly

Principal Research Scientist and Leader of ALFA Group at MIT-SAIL

Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting tools and cyber arms race models. More info

Faculty Member Barbara Johnson

Barbara Johnson

Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)² Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI

Securing information systems is Barbara’s purpose and educating security professionals is her passion. Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for the government, automotive, entertainment, financial, and travel sectors... More info

Faculty Member Rajiv Shridhar

Rajiv Shridhar

Information Security Officer and Director of Research Computing, MIT Sloan School of Management

Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students and collaborators by providing specialized computing infrastructure, data sets, software tools... More info

Faculty Member Howard Shrobe

Howard Shrobe

Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA

Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL initiative... More info

Guest Speakers

Faculty Member Caren Shiozaki

Caren Shiozaki

EVP-CIO for TMST, Inc., New Mexico. Vice Chair for SIM National, and founder of the national Cybersecurity SIG

Caren Shiozaki is EVP-CIO for TMST, Inc, a mortgage company in Santa Fe, New Mexico. She is also a Senior Fellow with the DivIHN Center of Excellence for digital security and risk. Previously she was CIO for a Dallas-based media company. She has worked internationally for Bank of America and American Express. Caren is Chair Emeritus for SIM's National Board, and co-founder of the national Digital Risk SIG. She is board chair for the Santa Fe Alliance for Science and the Santa Fe Animal Shelter. She holds professional certification in corporate governance, data privacy and is a certified e-discovery specialist. She holds a degree in Genetics from UC Berkeley.

Faculty Member Erica Wilson

Erica Wilson

CISO for Cass Information Systems

Erica Wilson has over 20 years of IT experience, 18 of which are in the field of cybersecurity. Erica currently serves as the CISO for Cass Information Systems. She has responsibility for all aspects of the company’s cybersecurity program; including security strategy, policies & procedures, technologies, and training. In addition, Erica leads all aspects of technology risk management, including compliance with internal and regulatory controls, as well as the Business Continuity Program. Erica also has a passion for STEM education. Throughout her professional career, she has consistently identified ways to influence and encourage others in the community to explore opportunities to work in the field information technology and cybersecurity.

Faculty Member Ion Santotomas

Ion Santotomas

Lead Security Analyst at Schneider Electric

Ion is a diligent senior cybersecurity professional with a strong technical background in systems engineering and infrastructure management. Ion is passionate about both offensive and defensive aspects of cybersecurity and actively participates in events, conferences, and online challenges to sharpen his technical skills and knowledge about the latest trends and attack vectors, to be a better defender.

Faculty Member Daniel Gorecki

Daniel Gorecki

Group Information Security Manager & CISO at Ascot Group

Daniel Gorecki is a Group Information Security Manager & CISO at Ascot Group. In this role he manages a global team for information risk management and cyber resiliency for the global organization. Prior to joining Ascot Group, he was the CISO at Aramark, and held the CISO and CIO roles at Intercept Pharmaceuticals. Dan maintains the certification for Certified Information Systems Security Professional (CISSP), Certified Data Privacy Solutions Engineer (CDPSE), has completed SIM's Regional Leadership Forum for IT Executives, and holds a B.E. in Computer Engineering from Stony Brook University.

Faculty Member Josh Schwartz

Josh Schwartz

Senior Director of Technical Security for The Paranoids, the Information Security Team at Yahoo

Josh Schwartz is a Senior Director of Technical Security for The Paranoids, the information security team at Yahoo, where he oversees an organization focused on offensive security assessments, red team methodology, and building products that support security culture and behavioral change initiatives.

Certificate

Example image of certificate that will be awarded after successful completion of this program

Certificate

Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants. This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

Download Brochure

After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, in the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

Registration for this program is done through Emeritus. You can contact us at mit@emeritus.org
Apply Now

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available. Learn more.