Post Graduate Certificate in Cybersecurity

Assess risk, improve defenses, and make your organization cyber-resilient

Download Brochure

Get Your Brochure

Course Dates

STARTS ON

March 27, 2024

Course Duration

DURATION

10 Months,
Online, 10-12 hours per week

Course Fee
Please note that GST at 18% will be charged additionally to the program fee.

ELIGIBILITY: Candidates with 5+ years of work experience as on March 27, 2024 are preferred

Application Details

program fee

₹2,87,000

Pay by

Program Overview

Cybersecurity as a career requires thinking quickly and strategically to ward off data breaches and network takeovers. It entails a strategic cat-and-mouse game of ever-changing defensive and offensive techniques. As a cybersecurity specialist on the frontline protecting enterprise IT networks and other critical internet-based information systems against cyberattacks, you have to decide which approach to apply when.

This is what joining the Post Graduate Certificate in Cybersecurity from MIT xPRO will teach you while developing your capability and giving your resume the MIT xPRO advantage! It's an immersive certificate program that will provide you with a comprehensive introduction to cybersecurity focused on the defensive and offensive aspects of technology. You will also benefit from receiving personalized feedback from program leaders, insights from guest speakers, career coaching, mentorship from leading faculty who are thought leaders in the field, and the opportunity to create a capstone network development project for a job portfolio.

Industry Trends

49%

of successful attacks on organizations resulted in compromise of sensitive information.

SOURCE: CYBERSECURITY THREATSCAPE OF ASIA: 2022-2023

3.5 Million

Cybersecurity jobs to be available globally

SOURCE: Cybercrime Magazine 2023

Program Details

280

Pre-recorded videos* for self-paced learning from renowned MIT faculty

51

Discussion Boards

34

Quizzes

58

Activities (Digital Journal, Crowdsource and Try-it activities)

59

Assignments**

Note:
*This is a self-paced online program. Thus, faculty will not be a part of weekly live sessions or any other live interaction in this program. We have a curated panel of eminent industry practitioners who will be conducting the weekly live doubt-clearing sessions.
**Assignments are graded either by industry practitioners who are available to support participants in their learning journey and/or by the Emeritus grading team. The final number of quizzes, assignments and discussions will be confirmed closer to the program start.

Program Highlights

A certificate from MIT xPRO to recognize your skills and success

Insights and case studies from renowned MIT faculty

Market-ready cybersecurity skills in a high-growth market

Capstone presentation project to share with potential employers

Access to cutting-edge tools and frameworks from MIT

Weekly live office hours with Q&A

Program Frameworks

National Institute of Standards and Technology (NIST) Framework

The NIST CSF framework is threaded throughout the entire program as a commonly used framework. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the defensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.

MITRE ATT&CK®

The MITRE ATT&CK® knowledge base is explored deeper in the offensive and defensive pieces of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.

Tools Covered

Note: The tools will be taught by teaching faculty, industry practitioners, or linked to relevant knowledge bases for your reference and self-guided learning.

Types of Tools Discussed

Case Studies

The Solar Winds supply chain attack of 2020, which compromised several thousand Orion users

The Saudi Aramco cyberattack of 2012 which wiped out 35000 computers and put the operations of the biggest oil company in the world at risk

The Cisco debacle of 2018 where a Cisco engineer broke through the security of Cisco, accessed 456 virtual machines and deleted 16000 Webex accounts

The MIRAI botnet attack of 2016, a severe DDOS attack which rendered much of the internet of the US east coast inaccessible

A study of the cyberculture and best practices in Cybersecurity on Verizon media

The Ukraine PowerGrid attack of 2015 which blew power for 200000+ consumers for 1-6 hours in Ukraine

The Baltimore ransomware attack of 2019 where Baltimore city was attacked by the aggressive ransomware RobbinHood costing more than $18mn

Who Is this Program for?

Mid-level and Senior-level career professionals who have established their careers in information technology and are looking to improve their organization's preparedness and response against cyberattacks and grow their career as leaders in cybersecurity strategies will benefit most from this program.

Additionally, graduates and early career professionals with or without prior experience in the IT field who want to specialize in cybersecurity from a globally recognized school and accelerate their career in a high-growth field with high-demand job opportunities will benefit from this program.

Past Participant Profile

The Massachusetts Institute of Technology (MIT) xPRO Advantage

#1

Private University

QS WORLD RANKING 2022

98

Nobel Prize Laureates

26

Turing Award Winners

Program Certificate

Example image of certificate that will be awarded after successful completion of this program

Program Certificate

Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants. This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

Download Brochure

After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, with the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

Program Faculty

Faculty Member KERI PEARLSON

KERI PEARLSON

Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has held positions in academia and industry, including Babson College, The University of Texas at Austin, Gartner's... More info

NICKOLAI ZELDOVICH

Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his Ph.D. from Stanford University in 2008. His research interests are in building practical secure systems. Recent projects... More info

Faculty Member DANNY WEITZNER

DANIEL J. WEITZNER

3Com Founders Principal Research Scientist, Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Daniel Weitzner is the founding director of the MIT Internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public policy in MIT's Electrical Engineering and Computer Science Department. His research pioneered the development of... More info

STUART MADNICK

John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT Sloan: the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity. His involvement... More info

Faculty Member LARRY SUSSKIND

LARRY SUSSKIND

Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cybersecurity for critical urban infrastructure, entrepreneurial negotiation, global environmental treaty-making... More info

Faculty Member UNA-MAY O'REILLY

UNA-MAY O'REILLY

Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL

Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, adversarial attacks on machine learning models, model training for adversarial robustness, and cyber hunting... More info

Faculty Member BARBARA JOHNSON

BARBARA JOHNSON

Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management, Education: BSISE, MBA, (ISC)2 Certifications: CISSP and ISSMP, ISACA Certifications: CISA, CISM, CRISC, CDPSE, Business Continuity Certifications: CBCP and MBCI

Securing information systems is Barbara's purpose and educating security professionals is her passion. Barbara Johnson is a Senior Security, Audit and Compliance Management Consultant with over 20 years of experience. She designs and manages information security programs for... More info

RAJIV SHRIDHAR

Information Security Officer and Director of Research Computing, MIT Sloan School of Management

Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Sloan faculty, students, and collaborators by providing specialized computing infrastructure, datasets, software... More info

Faculty Member HOWARD SHROBE

HOWARD SHROBE

Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts

Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, MA. He is a former Associate Director of CSAIL and former Director of CSAIL’s Cybersecurity@ CSAIL... More info

Section Summaries

Assignments

Section 1: Introduction to Cybersecurity

The first three months of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and IAM (identity and access management).

Discussions and Interactive Activities

Section 2: Defensive Cybersecurity

The second set of three months focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.

Demonstrations

Section 3: Offensive Cybersecurity

The next set of months address the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.

Program Modules

Module 1:

Introduction to Cybersecurity Risk Management

Module 2:

Cybersecurity Foundation Concepts

Module 3:

Federal Government’s Role: Laws, Operations, and Standards

Module 4:

Threats and Vulnerabilities

Module 5:

Cybersecurity and Critical Urban Infrastructure

Module 6:

IAM(Identity Access Management) Concepts

Module 7:

Layers of IAM and Technologies

Module 8:

Preparing for a Job in Cybersecurity Risk Management

Module 9:

Intro to Defensive Cybersecurity

Module 10:

Cryptography

Module 11:

Security Operations Centre

Module 12:

Incident Response

Module 13:

Secure Systems Administration

Module 14:

Secure Network Administration

Module 15:

Cloud Security

Module 16:

Preparing for a Job in Cybersecurity Operations

Module 17:

Intro to Offensive Cybersecurity

Module 18:

Penetration Testing Part 1

Module 19:

Penetration Testing Part 2

Module 20:

Social Engineering

Module 21:

Artificial Intelligence

Module 22:

Policy and Privacy, Regulation, and Data Governance

Module 23:

OT and IoT Risk

Module 24:

Preparing for a Job in Offensive Cybersecurity Operations

Module 1:

Introduction to Cybersecurity Risk Management

Module 13:

Secure Systems Administration

Module 2:

Cybersecurity Foundation Concepts

Module 14:

Secure Network Administration

Module 3:

Federal Government’s Role: Laws, Operations, and Standards

Module 15:

Cloud Security

Module 4:

Threats and Vulnerabilities

Module 16:

Preparing for a Job in Cybersecurity Operations

Module 5:

Cybersecurity and Critical Urban Infrastructure

Module 17:

Intro to Offensive Cybersecurity

Module 6:

IAM(Identity Access Management) Concepts

Module 18:

Penetration Testing Part 1

Module 7:

Layers of IAM and Technologies

Module 19:

Penetration Testing Part 2

Module 8:

Preparing for a Job in Cybersecurity Risk Management

Module 20:

Social Engineering

Module 9:

Intro to Defensive Cybersecurity

Module 21:

Artificial Intelligence

Module 10:

Cryptography

Module 22:

Policy and Privacy, Regulation, and Data Governance

Module 11:

Security Operations Centre

Module 23:

OT and IoT Risk

Module 12:

Incident Response

Module 24:

Preparing for a Job in Offensive Cybersecurity Operations
Download Brochure

Program Mentor & Learning Facilitators

Dinesh is an Information Security Management professional working in the IT/IS domain for more than a decade on consulting, auditing, and advisory projects in India and overseas.

Having extensive business experience in trading, manufacturing, and IT sector he brings a unique blend of techno commercial expertise to offering advisory and strategic consulting services in Cyber Security. He is a Virtual CISO for several clients and provides cybersecurity audit, fraud and forensic investigation services to clients in India and EMEA.

He is a hands-on professional in Security Risk Management, GRC, Security Incident Investigation, Response and Management, SOC setup, ISMS, Cloud Security and Compliance with national and international regulatory guidelines.

— Dinesh Bareja, Mentor, Founder & COO - Open Security Alliance and IndiaWatch.in
Advisor - Cyber Peace Foundation & Defence Institute of Advanced Technology
Ex Cyber Surveillance Advisor - Jharkhand Police

Bhowmik Shah is a seasoned Systems and Security professional with global experience with enterprises across Australia, USA, and India. He has an extensive background in DevOps and Cyber Security with more than 15 years spent designing and securing systems, applications, and infrastructure. As an ISO27001 Lead Auditor he also has experience with managing governance and compliance for enterprises. 

Currently a Co-Founder at CyberNX, he functions as the Chief Technology Officer & Cyber Security subject matter expert. Taking on the mantle of running and scaling a business in addition to tackling client boardroom and committee meetings where he functions as a Chief Information Security Officer.

— Bhowmik Shah, Learning Facilitator,
Co-Founder and Chief Technology Officer - CyberNX Technologies Private Limited

Over 26 years of IT Enterprise and academic experience with multinational organizations. Expertise in Cybersecurity, Digital Forensics, IT Security & Operations Management, and Networks, Virtualization. He works with local Cyber cell and Investigation agencies to train and support. He has Published over 75 research papers, books, chapters & patent in referred journals. Editorial Review Board and Associate Editor for several international journals. Leading Post Graduate Cyber Defense, Cybersecurity COE, Academic-Industry collaborations, MoU with NVIDIA AI, Data Security Council of India, Softlink, and CompTIA.

— Dr. Akashdeep Bhardwaj, Learning Facilitator, Research Professor (Cyber Security & Digital Forensics) - University of Petroleum and Energy Studies
Subject Matter Expert - Security+
CompTIA International Advisory Board Member - Certified Ethical Hacking (CEH)

Golam Azam commands 15 plus years of core experienced versatile Cybersecurity Leadership, Teacher, Architect, Writer & Mentor with Executive MBA and outstanding Computer Engineering Degrees. Extraordinary expertise in leading IT and Security, designing and implementing secure network solutions, managing investigations, audits and sensitive information and intelligence. Served as the Cybersecurity Director, VP, Manager, Security Team Lead in a 24x7x365 automated manner of proactive security. For instance: Global Financial services, Airlines, leading Entertainment Company, Tech Company, Police Department, Healthcare and US Government agencies.

— Golam Azam, Next-Generation Cybersecurity Leader - United Airlines, PwC, CNBC / NBCUniversal, 7Eleven, US Presidential Election Security (NDIT), AIG
Founder of Israel Technologies Inc.
Sr. Consultant - PaloAlto Networks

Capstone Project

  • Participants will work on a capstone project detailing the Equifax data breach of 2017 and associated events.
  • Participants will analyse the data breach which resulted in the breach of data of 140 million consumers.
  • They will investigate what were the primary reasons of the breach and gaps in cybersecurity in the case, using the knowledge gained during the course.
  • Participants would then create a defensive and offensive strategy to tackle such breaches and present their findings and their key insights in detail.
  • The project will help participants observe, analyse, and implement their learnings in a real-life case and get the best out of the MIT Post Graduate in Cybersecurity course.

Office Hours : Every Saturdays at 9 AM IST*

Registration for this program is done through Emeritus. You can contact us at mit.xpro@emeritus.org

This program is open for enrolments for residents of India, Bangladesh, Bhutan, Myanmar, Nepal, Pakistan, Sri Lanka, Philippines, Indonesia, Thailand, Vietnam and Malaysia only.

Note: Learning facilitator details and office hour dates and timings are from previous batches. The learning facilitators may change for upcoming batches based on availability and the office hour timings and dates may be changed based on a mutually decided schedule between Emeritus and the Learning facilitator.

*Mentioned timelines are tentative.

Emeritus Career Services*

  • Career Management Modules on:
    • Building an Impressive Resume & Cover Letter
    • Building an Impressive LinkedIn Profile
    • Navigating Job Search
    • Interview Preparation
    • Job Assistance

Please note:

  • MIT xPRO or Emeritus do NOT promise or guarantee a job or progression in your current job. Career Services is only offered as a service that empowers you to manage your career proactively. The Career Services mentioned here are offered by Emeritus. MIT xPRO is NOT involved in any way and makes no commitments regarding the Career Services mentioned here.
  • This service is available only for Indian residents enrolled into select Emeritus programs.

Financing Options* Starting at INR 8,325/ Month.

Option 1

Program Fee: INR 2,87,000
Maximum Loan Amount: INR 3,38,660
Tenure (months): 12
EMI/ month: INR 30,903

Option 2

Program Fee: INR 2,87,000
Maximum Loan Amount: INR 3,38,660
Tenure (months): 24
EMI/ month: INR 16,792

Option 3

Program Fee: INR 2,87,000
Maximum Loan Amount: INR 3,38,660
Tenure (months): 36
EMI/ month: INR 12,088

Option 4

Program Fee: INR 2,87,000
Maximum Loan Amount: INR 3,38,660
Tenure (months): 48
EMI/ month: INR 9,736

Option 5

Program Fee: INR 2,87,000
Maximum Loan Amount: INR 3,38,660
Tenure (months): 60
EMI/ month: INR 8,325

PF + 18% Gst on Loan amount INR 3,656
Also available in 12/ 18/ 24/ months EMI plans.


Note:
The above EMI's are indicative and figures in INR are approx.
The EMI's offered by each of the loan providers might vary from the above figures, depending upon tenure and loan amount to be disbursed.
Our Program Advisors will help you with information on how to avail a loan from our loan providers.
*Applicable only for Indian residents.

The Learning Experience

What is it like to learn with the learning collaborator, Emeritus?

More than 300,000 professionals globally, across 200 countries, have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded. All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes, the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner during the course period the cost of which is already included in the overall Course fee of the course.

A dedicated program support team is available 7 days a week to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.
Apply Now

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available. Learn more.