Professional Certificate in Cybersecurity

Accelerate your career in cybersecurity in 24 weeks, online

Download Brochure

Get Your Brochure

Course Date
LAST DAY TO ENROLL

Course Duration

DURATION

24 weeks, online
15–20 hours per week

Course Fee

PROGRAM FEE

US$7,450 or get US$745 off with a referral

Course Information Flexible payment available
Course Fee

For Your Team

Enroll your team and learn with your peers

Learn More

Explore financing options available for this program.
Learn More

Advance Your Career in Cybersecurity with MIT xPRO

Cyberattacks are becoming more frequent, complex, and targeted, collectively costing organizations billions of dollars every year. This is why cybersecurity is one of the fastest growing industries in the US, as every year more companies and government agencies seek to hire cybersecurity professionals with the specialized technical skills needed to defend mission-critical computer systems, networks, and cloud applications, against cyberattacks.

Enroll today in the MIT xPRO Professional Certificate in Cybersecurity program, which focuses on both defensive and offensive aspects of the technology. It also includes personalized feedback from program leaders, insights from guest speakers, career coaching, mentorship, and the opportunity to create a capstone project on network development to use for a job portfolio.

Take the next step to advance your career with the MIT xPRO Professional Certificate in Cybersecurity program.

$403 Billion

The projected value of the cybersecurity market through 2027

Source: Forbes

600,000

The number of unfilled cybersecurity positions in the US in 2022

Source: Bloomberg

Who Is This Program For?

This program is a career accelerator for those who want to learn the essentials of cybersecurity from MIT faculty.

  • Career Launchers: Early-career IT professionals, network engineers, and system administrators wanting to gain a comprehensive overview of cybersecurity and prepare themselves for continued career progression in this high-growth field.
  • Career Builders: IT project managers and engineers wanting to gain the ability to think critically about the threat landscape including vulnerabilities in cybersecurity, to better understand what kind of cybersecurity to specialize in, and upgrade their own resume for career advancement
  • Career Switchers: Mid- or later-career professionals currently working outside of cybersecurity wanting to add critical cybersecurity knowledge and foundational lessons to their resume as they begin considering a career change to an in-demand field.
Download Brochure

Program Frameworks

MITRE ATT&CK®

The MITRE ATT&CK knowledge base is explored deeper in the offensive and defensive aspects of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the defensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.

National Institute of Standards and Technology (NIST) Framework

The NIST CSF framework is threaded throughout the entire program. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

Section Summaries

Decorative image relating to text that follows

Section 1: Introduction to Cybersecurity

The first eight weeks of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and identity and access management (IAM).

Decorative image relating to text that follows

Section 2: Defensive Cybersecurity

The second set of eight weeks focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.

Decorative image relating to text that follows

Section 3: Offensive Cybersecurity

The final set of eight weeks addresses the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.

Program Highlights

Decorative image relating to text that follows

Earn a certificate and 36 Continuing Education Units (CEUs) from MIT xPRO

Decorative image relating to text that follows

Insights and case studies from renowned MIT faculty

Decorative image relating to text that follows

Foundational cybersecurity knowledge

Decorative image relating to text that follows

Completion of a capstone presentation to share with potential employers

Decorative image relating to text that follows

A great foundation towards a degree or certification in cybersecurity

Program Topics

Whether you are just starting your IT career or expanding into an adjacent field, this comprehensive program will equip you with the foundational knowledge needed to succeed in the field of cybersecurity. This 24-week program includes the following modules:

Week 1:

Introduction to Cybersecurity Risk Management

Week 2:

Cybersecurity Foundation Concepts

Week 3:

Federal Government Role: Law, Operations, and Standards

Week 4:

Threats and Vulnerabilities

Week 5:

Cybersecurity for Critical Urban Infrastructure

Week 6:

Identity and Access Management (IAM) Concepts

Week 7:

IAM Layers and Technology

Week 8:

Preparing for a Job in Cybersecurity Risk Management

Week 9:

Introduction to Defensive Cybersecurity

Week 10:

Cryptography

Week 11:

Security Operations Center (SOC)

Week 12:

Incident Response (IR)

Week 13:

Secure Systems Administration

Week 14:

Secure Network Administration

Week 15:

Cloud Security

Week 16:

Preparing for a Job in Cybersecurity Operations

Week 17:

Introduction to Offensive Cybersecurity

Week 18:

Penetration Testing Part 1

Week 19:

Penetration Testing Part 2

Week 20:

Social Engineering

Week 21:

Artificial Intelligence

Week 22:

Policy and Privacy, Regulation, and Data Governance

Week 23:

OT and IoT Risk

Week 24:

Preparing for a Job in Offensive Cybersecurity Operations

Week 1:

Introduction to Cybersecurity Risk Management

Week 13:

Secure Systems Administration

Week 2:

Cybersecurity Foundation Concepts

Week 14:

Secure Network Administration

Week 3:

Federal Government Role: Law, Operations, and Standards

Week 15:

Cloud Security

Week 4:

Threats and Vulnerabilities

Week 16:

Preparing for a Job in Cybersecurity Operations

Week 5:

Cybersecurity for Critical Urban Infrastructure

Week 17:

Introduction to Offensive Cybersecurity

Week 6:

Identity and Access Management (IAM) Concepts

Week 18:

Penetration Testing Part 1

Week 7:

IAM Layers and Technology

Week 19:

Penetration Testing Part 2

Week 8:

Preparing for a Job in Cybersecurity Risk Management

Week 20:

Social Engineering

Week 9:

Introduction to Defensive Cybersecurity

Week 21:

Artificial Intelligence

Week 10:

Cryptography

Week 22:

Policy and Privacy, Regulation, and Data Governance

Week 11:

Security Operations Center (SOC)

Week 23:

OT and IoT Risk

Week 12:

Incident Response (IR)

Week 24:

Preparing for a Job in Offensive Cybersecurity Operations
Download Brochure

Career Preparation and Guidance

Stepping into a career in cybersecurity requires a variety of skills, both hard and soft. This program offers guidance in navigating a career path in tech, including crafting your elevator pitch and providing communication tips. These services are provided by Emeritus, our learning collaborator for this program. The program support team includes course leaders who help you reach your learning goals and career coaches to guide you through your job search. The program offers career preparation and guidance, however, job placement is not guaranteed.

Emeritus provides the following career preparation services:

  • Crafting your elevator pitch
  • LinkedIn profile guidance
  • Resume/cover letters
  • Navigating your job search
  • Interview tips and preparation
  • Negotiating salary

Career exercises focused on launching a career in cybersecurity include:

  • Job searching and interviewing for cybersecurity positions
  • Building your personal brand and promoting your skills
  • Communicating cybersecurity concepts through presentation skills

Program Instructors

Faculty Member Keri Pearlson

Keri Pearlson

Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of the Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's Research Board, CSC,.. More info

Faculty Member Nickolai Zeldovich

Nickolai Zeldovich

Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008... More info

Faculty Member Stuart Madnick

Stuart Madnick

John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus, at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity... More info

Faculty Member Danny Weitzner

Danny Weitzner

3Com Founders Principal Research Scientist Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Prof. Weitzner is founding director of the MIT internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of accountable systems to enable computational treatment of legal rules... More info

Faculty Member Larry Susskind

Larry Susskind

Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making... More info

Faculty Member Una-May O'Reilly

Una-May O'Reilly

Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL

Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting tools and cyber arms race models... More info

Faculty Member Barbara Johnson

Barbara Johnson

Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)² Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI

Securing information systems is Barbara’s purpose and educating security professionals is her passion. Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for the government, automotive, entertainment, financial, and travel sectors... More info

Faculty Member Rajiv Shridhar

Rajiv Shridhar

Information Security Officer and Director of Research Computing, MIT Sloan School of Management

Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students and collaborators by providing specialized computing infrastructure, data sets, software tools... More info

Faculty Member Howard Shrobe

Howard Shrobe

Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts

Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL initiative... More info

Guest Speakers

Faculty Member Caren Shiozaki

Caren Shiozaki

EVP-CIO for TMST, Inc., New Mexico. Vice Chair for SIM and Founder of the SIM Cybersecurity SIG

Caren Shiozaki is EVP-CIO for TMST, Inc., a mortgage organization in Santa Fe, New Mexico. She is also a Senior Fellow with the DivIHN Center of Excellence for digital security and risk. Previously she was CIO for a Dallas-based media organization. She has worked internationally for Bank of America and American Express. Caren is Chair Emeritus for SIM's National Board and co-founder of the national Digital Risk SIG. She is board chair for the Santa Fe Alliance for Science and the Santa Fe Animal Shelter. She holds professional certifications in corporate governance and data privacy and is a certified e-discovery specialist. She holds a degree in genetics from UC Berkeley.

Faculty Member Erica Wilson

Erica Wilson

CISO for Cass Information Systems

Erica Wilson has over 20 years of IT experience, 18 of which are in the field of cybersecurity. Erica currently serves as the CISO for Cass Information Systems. She has responsibility for all aspects of the company’s cybersecurity program, including security strategy, policies and procedures, technologies, and training. In addition, Erica leads all aspects of technology risk management, including compliance with internal and regulatory controls as well as the Business Continuity Program. Erica also has a passion for STEM education. Throughout her professional career, she has consistently identified ways to influence and encourage others in the community to explore opportunities to work in the field of information technology and cybersecurity. In this program.

Faculty Member Ion Santotomas

Ion Santotomas

Lead Security Analyst at Schneider Electric

Ion is a diligent senior cybersecurity professional with a strong technical background in systems engineering and infrastructure management. Ion is passionate about both offensive and defensive aspects of cybersecurity and actively participates in events, conferences, and online challenges to sharpen his technical skills and knowledge about the latest trends and attack vectors in order to become a better defender.

Faculty Member Daniel Gorecki

Daniel Gorecki

Group Information Security Manager & CISO at Ascot Group

Daniel Gorecki is a Group Information Security Manager and CISO at Ascot Group. In this role he manages a global team for information risk management and cyber resiliency for the global organization. Prior to joining Ascot Group, he was the CISO at Aramark and held the CISO and CIO roles at Intercept Pharmaceuticals. Dan maintains the certification for Certified Information Systems Security Professional (CISSP), Certified Data Privacy Solutions Engineer (CDPSE), has completed SIM's Regional Leadership Forum for IT Executives, and holds a B.E. in Computer Engineering from Stony Brook University.

Faculty Member Josh Schwartz

Josh Schwartz

Senior Director of Technical Security for The Paranoids, the Information Security Team at Yahoo

Josh Schwartz is the Senior Director of Technical Security for The Paranoids, the information security team at Yahoo, where he oversees an organization focused on offensive security assessments, red team methodology, and building products that support security culture and behavioral change initiatives.

Faculty Member Matthew Lange

Matthew Lange

Assistant Director of the Adversarial Security Testing team at Northwestern Mutual

Matt Lange is currently the Assistant Director of the Adversarial Security Testing team at Northwestern Mutual where he leads a team of offensive security professionals accountable for penetration testing, red teaming, and purple teaming. He began his career in cybersecurity as an incident responder and forensic analyst. He quickly transitioned to penetration testing and red teaming where he helped build those programs from scratch. Matt graduated from the University of Wisconsin where he double majored in Mandarin Chinese and East Asian Politics, as well as Milwaukee Area Technical College where he received a degree in Information Systems Security and is an active member of its IT Security advisory board.

Faculty Member Keri Chisolm

Keri Chisolm

Cybersecurity Advisor for FedEx Services

Keri Chisolm has been working in Information Security for over 20 years. She began her security career as a staff member at the Center for Computer Security Research with the Computer Science and Engineering Department at Mississippi State University. As the security program at Mississippi State University grew, she also worked with the National Forensics Training Center and the Critical Infrastructure Protection Center. In addition to these roles, she also served as the systems administrator for the department where she supported numerous educational, production, and research systems. Later she joined the Information Security Team at FedEx where she worked for 3 years in Identity and Access Management with a particular focus on federated identities. In her current role with FedEx, she has joined the Cloud Security team with a focus on securing large IaaS and PaaS cloud offerings. Keri has earned her CISSP and CCSK certifications as well as multiple platform specific certifications. In her free time, she enjoys traveling, studying history, spending time with family, and attending sporting events.

What Our Participants Are Saying

"The topics on cryptography and penetration testing were the best parts of the program for me. These are the areas that I lacked confidence in, and this program has given me the baseline knowledge to advance to the next stage in my career."

— Mark Hughes, Integration Manager, QTS Global

"The content presented by the professors was the best part of the program for me. It's all relevant to what we are currently facing, and it can be applied to any organization."

— Euclides Garcia, Global IT Director, Infrastructure and Security, Del Monte Fresh Produce

"The availability and accessibility of the program were the best parts. I loved being able to do the course at any time during the week rather than set times. The material was very informative and helped strengthen my skills in the field."

— Allison Hamm, SOC Analyst, Solutions Granted Inc.

"The vast number of case studies gave me a more in-depth view into cybersecurity and its risks."

— Berndt Pilgram, Principal Lead of IT Systems and Data Science, Infineon Technologies

"The program roadmap was the best part of the program for me because the lessons were structured in a way that made learning each week’s lessons interconnected to each other in an intuitive way."

— Richard Napalan, FC Associate, Amazon

Certificate

Certificate

Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants and 36 Continuing Education Units (CEUs). This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

Download Brochure

After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, in the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

FAQs

  • How do I know if this program is right for me?

    After reviewing the information on the program landing page, we recommend you submit the short form above to gain access to the program brochure, which includes more in-depth information. If you still have questions on whether this program is a good fit for you, please email learner.success@emeritus.org, and a dedicated program advisor will follow-up with you very shortly.


    Are there any prerequisites for this program?

    Some programs do have prerequisites, particularly the more technical ones. This information will be noted on the program landing page, as well as in the program brochure. If you are uncertain about program prerequisites and your capabilities, please email us at the ID mentioned above.


    Note that, unless otherwise stated on the program web page, all programs are taught in English and proficiency in English is required.


    What is the typical class profile?

    More than 50 percent of our participants are from outside the United States. Class profiles vary from one cohort to the next, but, generally, our online certificates draw a highly diverse audience in terms of professional experience, industry, and geography — leading to a very rich peer learning and networking experience.


    What other dates will this program be offered in the future?

    Check back to this program web page or email us to inquire if future program dates or the timeline for future offerings have been confirmed yet.

  • How much time is required each week?

    Each program includes an estimated learner effort per week. This is referenced at the top of the program landing page under the Duration section, as well as in the program brochure, which you can obtain by submitting the short form at the top of this web page.


    How will my time be spent?

    We have designed this program to fit into your current working life as efficiently as possible. Time will be spent among a variety of activities including:



    • Engaging with recorded video lectures from faculty
    • Attending webinars and office hours, as per the specific program schedule
    • Reading or engaging with examples of core topics
    • Completing knowledge checks/quizzes and required activities
    • Engaging in moderated discussion groups with your peers
    • Completing your final project, if required

    The program is designed to be highly interactive while also allowing time for self-reflection and to demonstrate an understanding of the core topics through various active learning exercises. Please email us if you need further clarification on program activities.


    What is it like to learn online with the learning collaborator, Emeritus?

    More than 300,000 learners across 200 countries have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded.

    All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner the cost of which is already included in the overall course fee of the course.

    A dedicated program support team is available 24/5 (Monday to Friday) to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.


    How do I interact with other program participants?

    Peer learning adds substantially to the overall learning experience and is an important part of the program. You can connect and communicate with other participants through our learning platform.

  • What are the requirements to earn the certificate?

    Each program includes an estimated learner effort per week, so you can gauge what will be required before you enroll. This is referenced at the top of the program landing page under the Duration section, as well as in the program brochure, which you can obtain by submitting the short form at the top of this web page. All programs are designed to fit into your working life.

    This program is scored as a pass or no-pass; participants must complete the required activities to pass and obtain the certificate of completion. Some programs include a final project submission or other assignments to obtain passing status. This information will be noted in the program brochure. Please email us if you need further clarification on any specific program requirements.


    What type of certificate will I receive?

    Upon successful completion of the program, you will receive a smart digital certificate. The smart digital certificate can be shared with friends, family, schools, or potential employers. You can use it on your cover letter, resume, and/or display it on your LinkedIn profile.
    The digital certificate will be sent approximately two weeks after the program, once grading is complete.


    Can I get the hard copy of the certificate?

    No, only verified digital certificates will be issued upon successful completion. This allows you to share your credentials on social platforms such as LinkedIn, Facebook, and Twitter.


    Do I receive alumni status after completing this program?

    No, there is no alumni status granted for this program. In some cases, there are credits that count toward a higher level of certification. This information will be clearly noted in the program brochure.


    How long will I have access to the learning materials?

    You will have access to the online learning platform and all the videos and program materials for 12 months following the program start date. Access to the learning platform is restricted to registered participants per the terms of agreement.

  • What equipment or technical requirements are there for this program?

    Participants will need the latest version of their preferred browser to access the learning platform. In addition, Microsoft Office and a PDF viewer are required to access documents, spreadsheets, presentations, PDF files, and transcripts.


    Do I need to be online to access the program content?

    Yes, the learning platform is accessed via the internet, and video content is not available for download. However, you can download files of video transcripts, assignment templates, readings, etc. For maximum flexibility, you can access program content from a desktop, laptop, tablet, or mobile device.

    Video lectures must be streamed via the internet, and any livestream webinars and office hours will require an internet connection. However, these sessions are always recorded, so you may view them later.

  • Can I still register if the registration deadline has passed?

    Yes, you can register up until seven days past the published start date of the program without missing any of the core program material or learnings.


    What is the program fee, and what forms of payment do you accept?

    The program fee is noted at the top of this program web page and usually referenced in the program brochure as well.

    • Flexible payment options are available (see details below as well as at the top of this program web page next to FEE).
    • Tuition assistance is available for participants who qualify. Please email learner.success@emeritus.org.

    What if I don’t have a credit card? Is there another method of payment accepted?

    Yes, you can do the bank remittance in the program currency via wire transfer or debit card. Please contact your program advisor, or email us for details.


    I was not able to use the discount code provided. Can you help?

    Yes! Please email us with the details of the program you are interested in, and we will assist you.


    How can I obtain an invoice for payment?

    Please email us your invoicing requirements and the specific program you’re interested in enrolling in.


    Is there an option to make flexible payments for this program?

    Yes, the flexible payment option allows a participant to pay the program fee in installments. This option is made available on the payment page and should be selected before submitting the payment.


    How can I obtain a W9 form?

    Please connect with us via email for assistance.

  • Time of Refund Request

    • Within 21 days after course commencement
    • 22 to 45 days after course commencement
    • More than 45 days after course commencement

    Amount Refunded

    • Full refund of course fee (assuming no prior course deferral)
    • 50% of course fee (assuming no prior course deferral)
    • No refund of course fee

Financing Options

We offer flexible and transparent payment options through our partners—Climb Credit, Sallie Mae, Ascent Funding, and Knoma.

US Residents

CLIMB CREDIT

SALLIE MAE*

*At the time of loan application, please select 'Student, Career training school' when prompted.


ASCENT FUNDING

UK Residents

KNOMA

Flexible Payment Options For All

Flexible Payment Options

  • Monthly payments as low as US$1,166
    Choose to pay in two, three, or six monthly installments for higher flexibility Click here to know more.

You can opt for any one of the financing options to cover up to the full cost of the program tuition. If you are considering financing your program through one of our partners, the enrollment process can only be completed with the assistance of your program advisor.

Please note that loan applications should be submitted no later than four business days prior to the enrollment deadline due to processing time.

Didn't find what you were looking for?
Write to us at learner.success@emeritus.org
or Schedule a call with one of our Academic Advisors
or call us at +1 315 756 6926 (US) / + 44 192 824 1403 (UK) / +65 3129 4023 (SG)  
Apply Now

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available. Learn more.