The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.
CourtlynPromotion and Events Specialist
Accelerate your career in cybersecurity in 24 weeks, onlineDownload Brochure
Our participants tell us that taking this program together with their colleagues helps to share common language and accelerate impact.
We hope you find the same. Special pricing is available for groups.
The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.
CourtlynPromotion and Events Specialist
Cyberattacks are becoming more frequent, complex, and targeted, collectively costing organizations billions of dollars every year. This is why cybersecurity is one of the fastest growing industries in the US, as every year more companies and government agencies seek to hire cybersecurity professionals with the specialized technical skills needed to defend mission-critical computer systems, networks, and cloud applications, against cyberattacks.
Enroll today in the MIT xPRO Professional Certificate in Cybersecurity program, which focuses on both defensive and offensive aspects of the technology. It also includes personalized feedback from program leaders, insights from guest speakers, career coaching, mentorship, and the opportunity to create a capstone project on network development to use for a job portfolio.
Take the next step to advance your career with the MIT xPRO Professional Certificate in Cybersecurity program.
The projected value of the cybersecurity market through 2027
The number of unfilled cybersecurity positions in the US in 2022
This program is a career accelerator for those who want to learn the essentials of cybersecurity from MIT faculty.
The MITRE ATT&CK knowledge base is explored deeper in the offensive and defensive aspects of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.
The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the defensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.
The NIST CSF framework is threaded throughout the entire program. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.
The first eight weeks of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and identity and access management (IAM).
The second set of eight weeks focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.
The final set of eight weeks addresses the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.
Whether you are just starting your IT career or expanding into an adjacent field, this comprehensive program will equip you with the foundational knowledge needed to succeed in the field of cybersecurity. This 24-week program includes the following modules:
Stepping into a career in cybersecurity requires a variety of skills, both hard and soft. This program offers guidance in navigating a career path in tech, including crafting your elevator pitch and providing communication tips. These services are provided by Emeritus, our learning collaborator for this program. The program support team includes course leaders who help you reach your learning goals and career coaches to guide you through your job search. The program offers career preparation and guidance, however, job placement is not guaranteed.
Emeritus provides the following career preparation services:
Career exercises focused on launching a career in cybersecurity include:
Dr. Pearlson is the executive director of the Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's Research Board, CSC,.. More info
Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008... More info
Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus, at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity... More info
Prof. Weitzner is founding director of the MIT internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of accountable systems to enable computational treatment of legal rules... More info
Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making... More info
Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting tools and cyber arms race models... More info
Securing information systems is Barbara’s purpose and educating security professionals is her passion. Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for the government, automotive, entertainment, financial, and travel sectors... More info
Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students and collaborators by providing specialized computing infrastructure, data sets, software tools... More info
Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL initiative... More info
Dr. Pearlson is the executive director of the Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's Research Board, CSC, and AT&T. She founded KP Partners, a CIO advisory services firm and the IT Leaders' Forum, a community of next-generation IT executives. She is the founding director of the Analytics Leadership Consortium at the International Institute of Analytics. She began her career at Hughes Aircraft Company as a systems analyst.
Dr. Pearlson's research spans MIS, business strategy, and organizational design. Her current research studies how organizations build a culture of cybersecurity and how organizations build trust to share mitigations for cyber breaches. Dr. Pearlson holds a doctorate in business administration in MIS from Harvard Business School along with an M.S. in industrial engineering and a B.S. in mathematics from Stanford University. She is the founding president of the Austin Society for Information Management and was named "2014 National SIM Leader of the Year."
Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008. His research interests are in building practical secure systems. Recent projects by Prof. Zeldovich and his students and colleagues include the CryptDB encrypted database, the STACK tool for finding undefined behavior bugs in C programs, the FSCQ formally verified file system, the Algorand cryptocurrency, and the Vuvuzela private messaging system.
Dr. Zeldovich has been involved with several startup companies, including MokaFive (desktop virtualization), PreVeil (end-to-end encryption), and Algorand (cryptocurrency). His work has been recognized with "best paper" awards at the ACM SOSP conference, a Sloan fellowship (2010), an NSF CAREER award (2011), the MIT EECS Spira teaching award (2013), the MIT Edgerton faculty achievement award (2014), the ACM SIGOPS Mark Weiser award (2017), and an MIT EECS Faculty Research Innovation Fellowship (2018).
Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus, at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity. His involvement in cybersecurity research goes back to 1979, when he co-authored the book Computer Security. Currently, he heads the Cybersecurity at MIT Sloan Initiative.
Dr. Madnick holds a Ph.D. in computer science from MIT and has been an MIT faculty member since 1972. He served as head of MIT's Information Technologies Group in the Sloan School of Management for more than 20 years. He is the author or coauthor of more than 300 books, articles, and reports. Besides cybersecurity, his research interests include big data, semantic connectivity, database technology, software project management, and the strategic use of information technology.
Prof. Weitzner is founding director of the MIT internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of accountable systems to enable computational treatment of legal rules.
Prof. Weitzner was U.S. deputy chief technology officer for internet policy in the White House, where he led initiatives on privacy, cybersecurity, copyright, and digital trade policies promoting the free flow of information. He was responsible for the Obama administration's Consumer Privacy Bill of Rights and the OECD internet Policymaking Principles. He has a law degree from Buffalo Law School, and a B.A. in philosophy from Swarthmore College. His writings have appeared in Science, the Yale Law Review, Communications of the ACM, Washington Post, Wired Magazine and Social Research.
Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making, the resolution of science-intensive policy disputes, renewable energy policy, water equity in older American cities, climate change adaptation, socially responsible real estate development and the land claims of Indigenous peoples.
Prof. Susskind is director of the MIT Science Impact Collaborative. He is founder of the Consensus Building Institute, a Cambridge-based not-for-profit company that provides mediation services in complex resource management disputes around the world. He also was one of the co-founders of the interuniversity Program on Negotiation at Harvard Law School, where he now directs the MIT-Harvard Public Disputes Program, serves as vice chair for instruction, and leads PON's Master Classes in Negotiation. He is the recipient of ACSP's prestigious Educator of the Year Award and recipient of MIT's Award for Digital Instruction.
Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting tools and cyber arms race models.
One of the main areas Dr. O'Reilly is investigating is cybersecurity and how to stop destructive and escalating arms races. She hopes to understand the nature of adversarial intelligence by computationally replicating it—that is, by developing "artificial adversarial intelligence." This will help reveal the dynamics of conflicting behavior and how adaptation drives it, so that we can put a stop to these types of arms races. Dr. O'Reilly holds a PhD from Carleton University in Ottawa, Canada.
Securing information systems is Barbara’s purpose and educating security professionals is her passion.
Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for the government, automotive, entertainment, financial, and travel sectors. Her security, privacy, risk, and audit frameworks include ISO 27001, ISACA COBIT, NIST, HIPAA and PCI. She brings global best practices into her client’s enterprise security governance, policies and standards, architecture, and operations, inclusive of cryptography, incident response, and business continuity and disaster recovery. However, she tailors a security strategy to a client’s industry and risk appetite.
Barbara enhances educational delivery as a security, audit, and compliance practitioner. Barbara is a Lecturer at MIT Sloan School of Management and a courseware developer for MIT xPro Cyber Program. For (ISC)² CISSP and ISSMP: she develops courseware, teaches as a senior and lead instructor, speaks at Security Congress, and was Chair of (ISC)² Common Body of Knowledge. Furthermore, she imparts ISACA global best practices through its CISA, CISM, and CRISC certification classes. As a security educator, she has readied thousands of security professionals for certification exams.
Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students and collaborators by providing specialized computing infrastructure, data sets, software tools, support and technology consulting. As Information Security Officer, he is responsible for the development and oversight of risk and security frameworks in alignment with the information security needs of MIT Sloan.
Rajiv is a senior lecturer at Northeastern University, where he teaches graduate level courses in computer engineering, cyber physical systems and telecommunication networks. In his teaching he seeks to maximize student learning outcomes by reinforcing and extending in-class learning with experiential education via extensive hands-on projects, labs and assignments. Rajiv received an MS in Computer Systems Engineering from Northeastern University.
Howard ShrobeHoward Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL initiative. His research interests include AI, cybersecurity (particularly of control systems), and new computer architectures for inherently secure computing. Howard has a PhD from MIT.
Caren Shiozaki is EVP-CIO for TMST, Inc., a mortgage organization in Santa Fe, New Mexico. She is also a Senior Fellow with the DivIHN Center of Excellence for digital security and risk. Previously she was CIO for a Dallas-based media organization. She has worked internationally for Bank of America and American Express. Caren is Chair Emeritus for SIM's National Board and co-founder of the national Digital Risk SIG. She is board chair for the Santa Fe Alliance for Science and the Santa Fe Animal Shelter. She holds professional certifications in corporate governance and data privacy and is a certified e-discovery specialist. She holds a degree in genetics from UC Berkeley.
Erica Wilson has over 20 years of IT experience, 18 of which are in the field of cybersecurity. Erica currently serves as the CISO for Cass Information Systems. She has responsibility for all aspects of the company’s cybersecurity program, including security strategy, policies and procedures, technologies, and training. In addition, Erica leads all aspects of technology risk management, including compliance with internal and regulatory controls as well as the Business Continuity Program. Erica also has a passion for STEM education. Throughout her professional career, she has consistently identified ways to influence and encourage others in the community to explore opportunities to work in the field of information technology and cybersecurity. In this program.
Ion is a diligent senior cybersecurity professional with a strong technical background in systems engineering and infrastructure management. Ion is passionate about both offensive and defensive aspects of cybersecurity and actively participates in events, conferences, and online challenges to sharpen his technical skills and knowledge about the latest trends and attack vectors in order to become a better defender.
Daniel Gorecki is a Group Information Security Manager and CISO at Ascot Group. In this role he manages a global team for information risk management and cyber resiliency for the global organization. Prior to joining Ascot Group, he was the CISO at Aramark and held the CISO and CIO roles at Intercept Pharmaceuticals. Dan maintains the certification for Certified Information Systems Security Professional (CISSP), Certified Data Privacy Solutions Engineer (CDPSE), has completed SIM's Regional Leadership Forum for IT Executives, and holds a B.E. in Computer Engineering from Stony Brook University.
Josh Schwartz is the Senior Director of Technical Security for The Paranoids, the information security team at Yahoo, where he oversees an organization focused on offensive security assessments, red team methodology, and building products that support security culture and behavioral change initiatives.
Matt Lange is currently the Assistant Director of the Adversarial Security Testing team at Northwestern Mutual where he leads a team of offensive security professionals accountable for penetration testing, red teaming, and purple teaming. He began his career in cybersecurity as an incident responder and forensic analyst. He quickly transitioned to penetration testing and red teaming where he helped build those programs from scratch. Matt graduated from the University of Wisconsin where he double majored in Mandarin Chinese and East Asian Politics, as well as Milwaukee Area Technical College where he received a degree in Information Systems Security and is an active member of its IT Security advisory board.
Keri Chisolm has been working in Information Security for over 20 years. She began her security career as a staff member at the Center for Computer Security Research with the Computer Science and Engineering Department at Mississippi State University. As the security program at Mississippi State University grew, she also worked with the National Forensics Training Center and the Critical Infrastructure Protection Center. In addition to these roles, she also served as the systems administrator for the department where she supported numerous educational, production, and research systems. Later she joined the Information Security Team at FedEx where she worked for 3 years in Identity and Access Management with a particular focus on federated identities. In her current role with FedEx, she has joined the Cloud Security team with a focus on securing large IaaS and PaaS cloud offerings. Keri has earned her CISSP and CCSK certifications as well as multiple platform specific certifications. In her free time, she enjoys traveling, studying history, spending time with family, and attending sporting events.
"The topics on cryptography and penetration testing were the best parts of the program for me. These are the areas that I lacked confidence in, and this program has given me the baseline knowledge to advance to the next stage in my career."
— Mark Hughes, Integration Manager, QTS Global
"The content presented by the professors was the best part of the program for me. It's all relevant to what we are currently facing, and it can be applied to any organization."
— Euclides Garcia, Global IT Director, Infrastructure and Security, Del Monte Fresh Produce
"The availability and accessibility of the program were the best parts. I loved being able to do the course at any time during the week rather than set times. The material was very informative and helped strengthen my skills in the field."
— Allison Hamm, SOC Analyst, Solutions Granted Inc.
"The vast number of case studies gave me a more in-depth view into cybersecurity and its risks."
— Berndt Pilgram, Principal Lead of IT Systems and Data Science, Infineon Technologies
"The program roadmap was the best part of the program for me because the lessons were structured in a way that made learning each week’s lessons interconnected to each other in an intuitive way."
— Richard Napalan, FC Associate, Amazon
Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants and 36 Continuing Education Units (CEUs). This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.Download Brochure
After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, in the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.
After reviewing the information on the program landing page, we recommend you submit the short form above to gain access to the program brochure, which includes more in-depth information. If you still have questions on whether this program is a good fit for you, please email firstname.lastname@example.org, and a dedicated program advisor will follow up with you very shortly.
Some programs do have prerequisites, particularly the more technical ones. This information will be noted on the program landing page and in the program brochure. If you are uncertain about program prerequisites and your capabilities, please email us at email@example.com for assistance.
This is a graded program. You must complete a combination of individual assignments, quizzes, and a final project. Each component carries a certain number of points, and a cumulative score of 75 percent is required to pass and obtain your professional certificate.
The primary objective of this program is to give you the skills you need to be prepared for a job in this field. While eligible participants will receive career coaching and support and may receive introductions to our hiring partners, job placement is not guaranteed.
Each program includes an estimated learner effort per week. This is referenced at the top of the program landing page under the “Duration” section and in the program brochure, which you can obtain by submitting the short form at the top of this web page.
You will divide your learning time between viewing recorded coding demos, and video lectures, contributing to class discussions, completing assignments, projects, and knowledge checks, and attending optional live sessions with industry experts and program leaders.
The program is accessed through the custom learning portal. This portal will give you access to all program-related content such as video lectures, assignments, and discussions. Live office hours will be conducted using a webinar tool.
The video lectures and assignments are accessible weekly throughout the program. In the event you miss a live session, a recording will be made available.
Faculty video lectures are recorded, allowing you to watch these on your own schedule. However, participation in optional live sessions and discussion boards is highly encouraged. Live sessions will give you the opportunity to draw on the coding experience of our industry-experienced program leaders to answer your questions and help reach your learning goals. The discussion boards are also an integral part of the learning experience, giving you and your peers the opportunity to learn together and receive guidance from the moderators.
You can download video transcripts, assignment templates, readings, etc. However, the video lectures are only available for streaming and require an internet connection.
You can communicate with other participants through our learning platform. You will be able to form groups based on your interests and location. A direct messaging feature is also available through the platform.
More than 300,000 learners across 200 countries have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded.
All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner the cost of which is already included in the overall course fee of the course.
A dedicated program support team is available 24/5 (Monday to Friday) to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.
Each program includes an estimated learner effort per week, so you can gauge what is required before you enroll. This is referenced at the top of the program landing page under the “Duration” section and in the program brochure, which you can obtain by submitting the short form at the top of this web page. All programs are designed to fit into your working life.
This program is scored as a pass or no-pass; participants must complete the required activities to pass and obtain the certificate of completion. Some programs include a final project submission or other assignments to obtain passing status. This information will be noted in the program brochure. Please contact us at firstname.lastname@example.org if you need further clarification of any specific program requirements.
Upon successful completion of the program, you will receive a smart digital certificate. The smart digital certificate can be shared with friends, family, schools, or potential employers. You can use it on your cover letter, résumé, and/or display it on your LinkedIn profile.
The digital certificate will be sent approximately two weeks after the program, once grading is complete.
No, only verified digital certificates will be issued upon successful completion. This allows you to share your credentials on social platforms such as LinkedIn, Facebook, and Twitter.
No, there is no alumni status granted for this program. In some cases, there are credits that count toward a higher level of certification. This information will be clearly noted in the program brochure.
You will have access to the learning platform and all program materials (videos excluded) for one full year following the program end date. Access to the learning platform is restricted to registered participants per the terms of agreement.
To successfully complete this course/program(me) online, you must have access to a device meeting the minimum requirements, found here. In addition, Microsoft Office or similar product and a PDF viewer are required to access documents, spreadsheets, presentations, PDF files, and transcripts in all programs. Technical programs might have additional tech requirements. Please check the learning platform on the first day of class.
Yes, the learning platform is accessed via the internet and video content is not available for download. You can download files of video transcripts, assignment templates, readings, etc. Video lectures must be streamed via the internet and webinars and small group sessions will require an internet connection.
The program fee is shown at the top of this page and payment must be made in US dollars only.
Flexible payment options, group enrollment benefits, and referral bonus are available.
Tuition assistance may be available for participants who qualify. Please contact your program advisor to discuss.
Yes, you can do the bank remittance in USD via wire transfer. Please contact your program advisor for more details.
Yes flexible payment options are available for this program. We partner with loan providers to offer you flexible and transparent loan options. More information about loan financing is available here. Installment payments are also available—; you can find the options here.
Yes, the program fee is inclusive of any taxes with the exception of GST for Singapore residents.
After a participant has withdrawn, they will no longer be able to attend live sessions or 1:1 sessions with course leaders, mentors, or career coaches; submit work for review; or access their programme dashboard or curriculum.
Participants who would like to cancel their enrollment should email ProgramSupport@Emeritus.org or visit the “Support” tab in the learning platform to obtain a copy of the Withdrawal Request Form. This form must be submitted by midnight UTC of the last day of the trial period to be eligible for a full refund. No cancellations will be processed unless this form is received. Refunds will be issued within 30 days after the effective date of withdrawal or dismissal.
Participants have the option to request a deferral to a future cohort within the first 30 days from their program start date. Cohort changes may be made only once per enrollment and are subject to the availability of cohorts and scheduled at the discretion of Emeritus. Participants requesting a deferral must be in good academic standing. Participants who would like to defer their enrollment should email ProgramSupport@Emeritus.org or visit the “Support” tab in the learning platform to obtain a copy of the Deferral Request Form.
We offer flexible and transparent payment options through our partners—Climb Credit, Sallie Mae, and Knoma.
*At the time of loan application, please select 'Student, Career training school' when prompted.