Professional Certificate in Cybersecurity

Accelerate your career in cybersecurity in 24 weeks, online

Get Your Brochure

Course Dates
DEADLINE EXTENDED

Course Duration

DURATION

24 weeks, online
15–20 hours per week

Course Duration

Pay Nothing While You Learn. Financing Options Starting at US$25/Month.
Learn more

Advance Your Career in Cybersecurity With MIT xPRO

Cyberattacks are becoming more frequent, complex, and targeted, collectively costing organizations billions of dollars every year. This is why cybersecurity is one of the fastest growing industries in the US, as every year more companies and government agencies seek to hire cybersecurity professionals with the specialized technical skills needed to defend mission-critical computer systems, networks, cloud applications, and more against cyberattacks.

Now there's an easier way to acquire this versatile skill set that so many employers seek. Enroll today in the MIT xPRO Professional Certificate in Cybersecurity program, which focuses on both defensive and offensive aspects of the technology. It also includes personalized feedback from program leaders, insights from guest speakers, career coaching, mentorship, and the opportunity to create a capstone network development project for a job portfolio.

Take the next step to advance your career with the MIT xPRO Professional Certificate in Cybersecurity program.

$403B

The projected worth of the cybsersecurity market through 2027

Source: Forbes, 2021

338K+

Unique job postings in the U.S. requiring cybersecurity as a skill between March 2020 and March 2021

Source: EMSI Data, 2021

Who Is This Program For?

This program is a career accelerator for those who want to learn the essentials of cybersecurity from MIT faculty.

  • Career Launchers: Early-career professionals who have an interest in cybersecurity, IT professionals, network engineers, system administrators, and even non-IT professionals wanting to specialize in cybersecurity as a way to move up in a high-growth field with high-demand job opportunities.
  • Career Builders: IT project managers and engineering managers who want to improve their organizations' preparedness and response against cyberattacks and grow their careers as leaders in cybersecurity strategies.
  • Career Switchers: Mid- or later-career professionals looking to switch to cybersecurity as a specialty to refresh their careers and take advantage of the demand for cybersecurity talent in marketing, sales, human resources, operations, or any other field.

Program Frameworks

Decorative image relating to text that follows

MITRE ATT&CK®

The MITRE ATT&CK knowledge base is explored deeper in the offensive and defensive pieces of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.

Decorative image relating to text that follows

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the defensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.

Decorative image relating to text that follows

National Institute of Standards and Technology (NIST) Framework

The NIST CSF framework is threaded throughout the entire course as a commonly used framework. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

Program Highlights

Decorative image relating to text that follows

Earn a certificate from MIT xPRO and 36 Continuing Education Units (CEUs) from MIT

Decorative image relating to text that follows

Insights and case studies from renowned MIT faculty

Decorative image relating to text that follows

Market-ready cybersecurity skills for a high-growth market

Decorative image relating to text that follows

Completion of a capstone presentation to share with potential employers

Decorative image relating to text that follows

A great start towards a degree or certification in cybersecurity

Decorative image relating to text that follows

The knowledge to obtain an entry-level position in cybersecurity

Section Summaries

Decorative image relating to text that follows

Section 1: Introduction to Cybersecurity

The first eight weeks of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and IAM (identity and access management).

Decorative image relating to text that follows

Section 2: Defensive Cybersecurity

The second set of eight weeks focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.

Decorative image relating to text that follows

Section 3: Offensive Cybersecurity

The final set of eight weeks address the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.

Program Topics

This program is organized into three main sections: Introduction to Cybersecurity, Defensive Cybersecurity, and Offensive Cybersecurity. Whether you are just starting your IT career or expanding into a new specialty, this comprehensive program will equip you with the skills needed to excel in the field of cybersecurity. This 24-week program includes the following modules:

Week 1:

Introduction to Cybersecurity Risk Management

Week 2:

Cybersecurity Foundation Concepts

Week 3:

Federal Government Role: Law, Operations, and Standards

Week 4:

Threats and Vulnerabilities

Week 5:

Cybersecurity for Critical Urban Infrastructure

Week 6:

Identity and Access Management (IAM) Concepts

Week 7:

IAM Layers and Technology

Week 8:

Preparing for a Job in Cybersecurity Risk Management

Week 9:

Introduction to Defensive Cybersecurity

Week 10:

Cryptography

Week 11:

Security Operations Center (SOC)

Week 12:

Incident Response (IR)

Week 13:

Secure Systems Administration

Week 14:

Secure Network Administration

Week 15:

Cloud Security

Week 16:

Preparing for a Job in Cybersecurity Operations

Week 17:

Introduction to Offensive Cybersecurity

Week 18:

Penetration Testing Part 1

Week 19:

Penetration Testing Part 2

Week 20:

Social Engineering

Week 21:

Artificial Intelligence

Week 22:

Policy and Privacy, Regulation, and Data Governance

Week 23:

OT and IoT Risk

Week 24:

Preparing for a Job in Offensive Cybersecurity Operations

Week 1:

Introduction to Cybersecurity Risk Management

Week 13:

Secure Systems Administration

Week 2:

Cybersecurity Foundation Concepts

Week 14:

Secure Network Administration

Week 3:

Federal Government Role: Law, Operations, and Standards

Week 15:

Cloud Security

Week 4:

Threats and Vulnerabilities

Week 16:

Preparing for a Job in Cybersecurity Operations

Week 5:

Cybersecurity for Critical Urban Infrastructure

Week 17:

Introduction to Offensive Cybersecurity

Week 6:

Identity and Access Management (IAM) Concepts

Week 18:

Penetration Testing Part 1

Week 7:

IAM Layers and Technology

Week 19:

Penetration Testing Part 2

Week 8:

Preparing for a Job in Cybersecurity Risk Management

Week 20:

Social Engineering

Week 9:

Introduction to Defensive Cybersecurity

Week 21:

Artificial Intelligence

Week 10:

Cryptography

Week 22:

Policy and Privacy, Regulation, and Data Governance

Week 11:

Security Operations Center (SOC)

Week 23:

OT and IoT Risk

Week 12:

Incident Response (IR)

Week 24:

Preparing for a Job in Offensive Cybersecurity Operations
Download Brochure

Career Preparation and Guidance

Stepping into a career in cybersecurity requires a variety of skills, both hard and soft. This program guides you in navigating a career path into tech, including crafting your elevator pitch and providing communication tips. These services are provided by Emeritus, our learning collaborator for this program. The program support team includes course leaders who help you reach your learning goals and career coaches to guide you through your job search. The primary goal is to give you the skills needed to be prepared for a job in this field; however, job placement is not guaranteed.

Emeritus provides the following career preparation services:

  • Crafting your elevator pitch
  • LinkedIn profile guidance
  • Resume/cover letters
  • Navigating your job search
  • Interview tips and preparation
  • Negotiating salary

Career exercises focused on launching a career in cybersecurity include:

  • Job searching and interviewing for cybersecurity positions
  • Building your personal brand and promoting your skills
  • Communicating cybersecurity concepts through presentation skills

Program Instructors

Faculty Member Keri Pearlson

Keri Pearlson

Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of the Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's Research Board, CSC,.. More info

Faculty Member Nickolai Zeldovich

Nickolai Zeldovich

Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008... More info

Faculty Member Stuart Madnick

Stuart Madnick

John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus, at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity... More info

Faculty Member Danny Weitzner

Danny Weitzner

3Com Founders Principal Research Scientist Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Prof. Weitzner is founding director of the MIT internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of accountable systems to enable computational treatment of legal rules... More info

Faculty Member Larry Susskind

Larry Susskind

Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making... More info

Faculty Member Una-May O'Reilly

Una-May O'Reilly

Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL

Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting tools and cyber arms race models... More info

Faculty Member Barbara Johnson

Barbara Johnson

Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)² Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI

Securing information systems is Barbara’s purpose and educating security professionals is her passion. Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for the government, automotive, entertainment, financial, and travel sectors... More info

Faculty Member Rajiv Shridhar

Rajiv Shridhar

Information Security Officer and Director of Research Computing, MIT Sloan School of Management

Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students and collaborators by providing specialized computing infrastructure, data sets, software tools... More info

Faculty Member Howard Shrobe

Howard Shrobe

Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts

Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL initiative... More info

Guest Speakers

Faculty Member Caren Shiozaki

Caren Shiozaki

EVP-CIO for TMST, Inc., New Mexico. Vice Chair for SIM and Founder of the SIM Cybersecurity SIG

Caren Shiozaki is EVP-CIO for TMST, Inc., a mortgage organization in Santa Fe, New Mexico. She is also a Senior Fellow with the DivIHN Center of Excellence for digital security and risk. Previously she was CIO for a Dallas-based media organization. She has worked internationally for Bank of America and American Express. Caren is Chair Emeritus for SIM's National Board and co-founder of the national Digital Risk SIG. She is board chair for the Santa Fe Alliance for Science and the Santa Fe Animal Shelter. She holds professional certifications in corporate governance and data privacy and is a certified e-discovery specialist. She holds a degree in genetics from UC Berkeley.

Faculty Member Erica Wilson

Erica Wilson

CISO for Cass Information Systems

Erica Wilson has over 20 years of IT experience, 18 of which are in the field of cybersecurity. Erica currently serves as the CISO for Cass Information Systems. She has responsibility for all aspects of the company’s cybersecurity program, including security strategy, policies and procedures, technologies, and training. In addition, Erica leads all aspects of technology risk management, including compliance with internal and regulatory controls as well as the Business Continuity Program. Erica also has a passion for STEM education. Throughout her professional career, she has consistently identified ways to influence and encourage others in the community to explore opportunities to work in the field of information technology and cybersecurity. In this program.

Faculty Member Ion Santotomas

Ion Santotomas

Lead Security Analyst at Schneider Electric

Ion is a diligent senior cybersecurity professional with a strong technical background in systems engineering and infrastructure management. Ion is passionate about both offensive and defensive aspects of cybersecurity and actively participates in events, conferences, and online challenges to sharpen his technical skills and knowledge about the latest trends and attack vectors in order to become a better defender.

Faculty Member Daniel Gorecki

Daniel Gorecki

Group Information Security Manager & CISO at Ascot Group

Daniel Gorecki is a Group Information Security Manager and CISO at Ascot Group. In this role he manages a global team for information risk management and cyber resiliency for the global organization. Prior to joining Ascot Group, he was the CISO at Aramark and held the CISO and CIO roles at Intercept Pharmaceuticals. Dan maintains the certification for Certified Information Systems Security Professional (CISSP), Certified Data Privacy Solutions Engineer (CDPSE), has completed SIM's Regional Leadership Forum for IT Executives, and holds a B.E. in Computer Engineering from Stony Brook University.

Faculty Member Josh Schwartz

Josh Schwartz

Senior Director of Technical Security for The Paranoids, the Information Security Team at Yahoo

Josh Schwartz is the Senior Director of Technical Security for The Paranoids, the information security team at Yahoo, where he oversees an organization focused on offensive security assessments, red team methodology, and building products that support security culture and behavioral change initiatives.

Faculty Member Matthew Lange

Matthew Lange

Assistant Director of the Adversarial Security Testing team at Northwestern Mutual

Matt Lange is currently the Assistant Director of the Adversarial Security Testing team at Northwestern Mutual where he leads a team of offensive security professionals accountable for penetration testing, red teaming, and purple teaming. He began his career in cybersecurity as an incident responder and forensic analyst. He quickly transitioned to penetration testing and red teaming where he helped build those programs from scratch. Matt graduated from the University of Wisconsin where he double majored in Mandarin Chinese and East Asian Politics, as well as Milwaukee Area Technical College where he received a degree in Information Systems Security and is an active member of its IT Security advisory board.

Faculty Member Keri Chisolm

Keri Chisolm

Cybersecurity Advisor for FedEx Services

Keri Chisolm has been working in Information Security for over 20 years. She began her security career as a staff member at the Center for Computer Security Research with the Computer Science and Engineering Department at Mississippi State University. As the security program at Mississippi State University grew, she also worked with the National Forensics Training Center and the Critical Infrastructure Protection Center. In addition to these roles, she also served as the systems administrator for the department where she supported numerous educational, production, and research systems. Later she joined the Information Security Team at FedEx where she worked for 3 years in Identity and Access Management with a particular focus on federated identities. In her current role with FedEx, she has joined the Cloud Security team with a focus on securing large IaaS and PaaS cloud offerings. Keri has earned her CISSP and CCSK certifications as well as multiple platform specific certifications. In her free time, she enjoys traveling, studying history, spending time with family, and attending sporting events.

Certificate

Example image of certificate that will be awarded after successful completion of this program

Certificate

Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants and 36 Continuing Education Units (CEUs) from MIT. This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

Download Brochure

After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, in the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

Pay Nothing While You Learn. Financing Options Starting at US$25/Month.

  • ASCENT FUNDING

    Monthly payments starting US$40
    Immediate repayment, interest-only repayment, and deferred payment options available. Click here to know more.



    SALLIE MAE

    Monthly payments starting US$25
    Fixed repayment, interest-only repayment, and deferred payment options available. Click here to know more.


    *At the time of loan application, please select 'Student and Career Training School' when prompted.

  • KNOMA

    Monthly payments starting £420
    Interest-free financing options available. Click here to know more.

  • Monthly payments as low as US$1,166
    Choose to pay in two, three, or six monthly installments for higher flexibility Click here to know more.

Registration for this program is done through Emeritus. You can contact us at mit@emeritus.org
Apply Now

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available. Learn more.