Professional Documents
Culture Documents
CYBERSECURITY
Assess risk, improve defenses, and make your organization
cyber resilient with the MIT xPRO edge
Overview
Cyberattacks are becoming more frequent, complex, This is what joining the Post Graduate Certificate in
and targeted, collectively costing organizations billions Cybersecurity will teach you while developing your
of dollars every year. To put this in perspective, a recent capability and giving your resume the MIT xPRO
report by IBM states that India reported the advantage! It's an immersive certificate program that will
second-highest number of cyberattacks in the provide you with a comprehensive introduction to
Asia-Pacific region (The Economic Times, 2021). No cybersecurity focused on the defensive and offensive
wonder industries and business sizes face a surging aspects of technology. You will also benefit from
demand for specialists and trained cybersecurity receiving personalized feedback from program leaders,
professionals with technical expertise to defend insights from guest speakers, career coaching,
missioncritical computer systems, networks, and cloud mentorship from leading faculty who are thought leaders
applications against growing cyberattacks. in the field, and the opportunity to create a capstone
network development project for a job portfolio.
Cybersecurity as a career requires thinking quickly and
strategically to ward off data breaches and network MIT xPRO's online learning programs feature exclusive
takeovers. It entails a strategic cat-and-mouse game of content from world-renowned experts to make learning
ever-changing defensive and offensive techniques. As a accessible anytime, anywhere. If you want to accelerate
cybersecurity specialist on the frontline protecting your career with new skills or enhance your existing
enterprise IT networks and other critical internetbased expertise, take the next step, and apply to the Post
information systems against cyberattacks, you have to Graduate Certificate in Cybersecurity program.
decide which approach to apply when.
For residents of India, Bangladesh, Bhutan, Burma, Nepal, Pakistan, Sri Lanka,
Philippines, Indonesia, Thailand, Vietnam and Malaysia only.
3.5 M By 2025 there will be 3.5 million cybersecurity jobs open globally
Source : Cybersecurity Jobs Report 2021
STARTS
August 17, 2022
PRICE
USD 3,500
(Approx. INR 2,62,000)
DURATION
10 Months
10-12 hours per week
Program Highlights
280 Videos 51 34
Discussion Boards Quizzes
58 Activities 59
(Digital Journal, Crowdsource
and Try-it activities) Assignments
MITRE ATT&CK®
Program Frameworks
The MITRE ATT&CK® knowledge base is explored deeper in the offensive and defensive
pieces of this program. It contains adversary tactics and techniques that are utilized as the
foundational development of specific threat models and methodologies.
MITRE ATT&CK®
The MITRE ATT&CK® knowledge base is explored deeper in the offensive and defensive
pieces of this program. It contains adversary tactics and techniques that are utilized as the
foundational development of specific threat models and methodologies.
Types of Tools Discussed
Security Information and User and Entity Behavior Endpoint Detection and
Event Management Tools Analytics Tools Response Tools
Mid and senior career professionals who have established their careers in
informationtechnology and are looking to improve their organization’s preparedness and
response against cyberattacks and grow their career as leaders in cybersecurity strategies
will benefit most from this program.
Additionally, graduates and early career professionals with or without prior experience in
the IT field who want to specialize in cybersecurity from a globally recognized school and
accelerate their career in a high-growth field with high-demand job opportunities will
benefit from this program.
IAM Analyst
SOC Analyst
Work Experience
Top Industries
12%
Banking & 5%
Financial Electronics /
Services Hardware
61% 7% 15%
IT Services & Healthcare *Others
Products
Top Functions
5%
15% Project
Engineering Management
23% 19% 8%
Manager CXO/VP Informa�on
/Director Security
Analyst
*Others includes Technical Architect, Project Supervisor, Technical Content Writer amongst others
Program Schedule
Whether you are just starting your IT career or expanding into a new specialty, this comprehensive program
prepares you with the skills needed to excel in both the offensive and defensive aspects of cybersecurity
technology. Through the course of this program, you will:
Explore the landscape of various network threats and vulnerabilities and evaluate responses to each
Create a digital journal of your learning along with a capstone presentation to share with potential employers
Section 0
Orientation
The first week is an orientation module. You will gain access to the learning platform from the program start date.
There is no teaching involved, and all content is pre-recorded.
Pillar 1
Introduction to Cybersecurity
Key Takeaways
Explore the basic concepts of computer security systems and their operations
Explore the threat landscape and break down the types of threats and vulnerabilities
Identify the key components and sequences of incident response frameworks
Explore the fundamentals and strategies to protect systems
Module 1: Module 2:
Introduction to Cybersecurity Risk Cybersecurity Foundation Concepts
Management Basic concepts of cybersecurity
Foundations of cybersecurity Isolation, sharing and access
Current events Secure implementation
Protecting organizations Privilege separation
Cybersecurity as risk management
Cybersecurity as an organization
Module 3: Module 4:
Federal Government Role: Law, Threats and Vulnerabilities
Operations, and Standards Threats: Disruption Of Operations And Attacks On
Laws: Federal, State, And International Internet Of Things (IoT) And Equipment
Federal criminal law, data breach Vulnerabilities : Basic technical attacks
Privacy Vulnerability analysis and management
Cybersecurity frameworks : NIST/CIS/SOC GDPR Social engineering attacks
Indian Cybersecurity laws Publicizing threats
Pillar 2
Identity Access Management
Key Takeaways
Module 5: Module 6:
Cybersecurity for Critical (IAM) Identity and Access
Urban Infrastructure Management Concepts
Initial Communication With A Client Agency IAM Principles and Concepts
Preparing a vulnerability assessment Identification
Vulnerability management processes, challenges Authentication
and opportunities Authorization to Resources and Audit and Accountability
Business Context
IAM Training and Testing
Module 7: IAM Policy Standards and procedure
Layers of IAM and technologies
Session Management Module 8:
Client IAM Preparing For A Job In Cybersecurity
Risk Management
Network IAM
Data IAM Control Techniques IAM Role
Risks and Controls Frameworks
SSO Third-party risks
FIM Concepts Security roles and security organizations
IAM Industry Defence in Depth
Pillar 3
Defensive Cybersecurity
Key Takeaways
Explore the workings of secure communications between computer systems and organizations
Learn how attacks are identified and how defensive cybersecurity responses are established
Gain knowledge of the functions, strengths, and weaknesses, and administration of SOCs
Identify key components and sequences of incident response frameworks
Learn how virtualization and the cloud are closely associated
Module 10:
Module 9:
Cryptography
Introduction to Defensive Cybersecurity
Networking Communication
Repercussions of inadequate defence
Securing data
Applying the NIST model
Message Authentication code
Défense in depth
Hash functions
Security processes
Encryptions and signatures
Layers of defence and security processes
Certificates and channels
Module 11: Module 12:
Security Operations Center (SOC) Incident Response (IR)
SOC performers services and tools IR overview
Analysts IR Key components(detection and analysis)
Reactive and automatic Threat detection Containment, Eradication and Recovery
Services and tools for threat detection Reflection
SOC roles and skills IR Roles and responsibilities
Pillar 4
Offensive Cybersecurity
Key Takeaways
Gain knowledge and understanding of how to identify and test vulnerabilities
See simulated cyberattacks on web application security
Learn to identify malicious activities cultivated by human actions
Understand privacy policies and how they relate to data governance
Learn to identify and mitigate risks associated with Operational Technology (OT) and Internet of Things (IoT) devices
Explore artificial intelligence (AI) techniques and how they relate to the cyber environment
Module 17: Module 18:
Intro to Offensive cybersecurity Penetration testing part 1
Security architecture and strategy Intro to penetration testing
Threat modelling Concepts and foundations
The Red Team and penetration testing Why penetration testing is conducted
NIST CSF and offensive cybersecurity When is Penetration testing performed
The Attacker mindset Frameworks of penetration testing
Security assessment, evaluation and testing cycle Penetration testing professionals
Module 24:
Module 23: Preparing for a job in offensive
cybersecurity operations
OT and IOT Risk
Concluding topics
IOT and OT concepts
Cybersecurity toolkit
Problems with IOT
Positions and skills
Vulnerabilities of IOT, Operational Technology (OT)
Professional advice
Mitigations
Apply Now
Hands-on Learning
Learn from case studies and apply
cybersecurity concepts to real-world
organizations and scenarios.
Capstone Project
Throughout the program, you will create a digital journal to record what you have learned in each module. You will
use the journal to create a capstone project, a recorded presentation demonstrating the cybersecurity skills that
qualify you for opportunities as a cybersecurity specialist. You will come away from this program with a
professional-quality presentation that you can share on LinkedIn or with potential employers.
Participants will work on a capstone project detailing the Equifax data breach of 2017 and associated events
Participants will analyze the data breach which resulted in the breach of data of 140 million consumers
They will investigate what were the primary reasons of the breach and gaps in cybersecurity in the case,
using the knowledge gained during the course
Participants would then create a defensive and offensive strategy to tackle such breaches and present their
findings and their key insights in detail
The project will help participants observe, analyze, and implement their learnings in a real-life case and get
the best out of the MIT X Pro Graduate in Cybersecurity course
Case Studies
The Solar Winds supply The Saudi Aramco cyberattack The Cisco debacle of 2018
chain attack of 2020, which of 2012 which wiped out where a Cisco engineer
compromised several 35000 computers and put the broke through the security
thousand Orion users operations of the biggest oil of Cisco, accessed 456
company in the world at risk virtual machines and
deleted 16000 Webex
accounts
The MIRAI botnet attack of A study of the cyberculture The Ukraine PowerGrid
2016, a severe DDOS attack and best practices in attack of 2015 which blew
which rendered much of the Cybersecurity on power for 200000+
internet of the US east coast Verizon media consumers for 1-6 hours in
inaccessible Ukraine
Note:
All product and company names are trademarks or registered trademarks of their respective holders
Use of them does not imply any affiliation with or endorsement by them
Career Preparation and Guidance*
Stepping into a career in cybersecurity requires a variety of job-ready skills, both hard and soft. This program guides
you in navigating a career path, starting from personalized mentorship sessions to job placement assistance while
developing your technical expertise to gain an edge over your peers. These services are provided by Emeritus, our
learning collaborator for this program. The program support team includes program leaders who help you reach your
learning goals and career coaches to guide you through your job search. The primary goal is to give you the skills
needed to be prepared for a job in this field; however, job placement is not guaranteed.
Keri Pearlson Dr. Pearlson's research spans MIS, business strategy, and organizational
Executive Director of Cybersecurity design. Her current research studies how organizations build a culture of
at MIT Sloan (CAMS): The cybersecurity and how organizations build trust to share mitigations for
Interdisciplinary Consortium for cyber breaches. Dr. Pearlson holds a doctorate in business administration in
Improving Critical Infrastructure MIS from Harvard Business School along with an M.S. in industrial
Cybersecurity at the MIT Sloan engineering and a B.S. in mathematics from Stanford University. She is the
School of Management founding president of the Austin Society for Information Management and
was named "2014 National SIM Leader of the Year."
Dr. Zeldovich has been involved with several startup companies, including
Nickolai Zeldovich MokaFive (desktop virtualization), PreVeil (end-to-end encryption), and
Professor of Electrical Algorand (cryptocurrency). His work has been recognized with "best paper"
Engineering and Computer awards at the ACM SOSP conference, a Sloan fellowship (2010), an NSF
Science, and a member of the CAREER award (2011), the MIT EECS Spira teaching award (2013), the MIT
Computer Science and Artificial Edgerton faculty achievement award (2014), the ACM SIGOPS Mark Weiser
Intelligence Laboratory at MIT award (2017), and an MIT EECS Faculty Research Innovation Fellowship (2018).
Faculty
Daniel Weitzner is the founding director of the MIT Internet Policy Research
Initiative and principal research scientist at CSAIL. In addition, he teaches
internet public policy in MIT's Electrical Engineering and Computer Science
Department. His research pioneered the development of accountable systems
to enable the computational treatment of legal rules.
He was U.S. Deputy Chief Technology Officer for internet policy in the White
House, where he led initiatives on privacy, cybersecurity, copyright, and digital
trade policies promoting the free flow of information. He was responsible for
the Obama administration's Consumer Privacy Bill of Rights and the OECD
Daniel J. Weitzner Internet Policymaking Principles. He has a law degree from Buffalo Law School,
and a B.A. in philosophy from Swarthmore College. His writings have appeared
3Com Founders Principal Research
in Science, the Yale Law Review, Communications of the ACM, Washington Post,
Scientist, Founding Director, MIT
Wired Magazine, and Social Research.
Internet Policy Research Initiative,
MIT Computer Science and
Artificial Intelligence Lab
Dr. Madnick holds a Ph.D. in computer science from MIT and has been an MIT
faculty member since 1972. He served as head of MIT's Information Technologies
Stuart Madnick Group in the Sloan School of Management for more than 20 years. He is the
John Norris Maguire Professor of author or co-author of more than 300 books, articles, and reports. Besides
Information Technologies, cybersecurity, his research interests include big data, semantic connectivity,
Emeritus, Sloan School of database technology, software project management, and the strategic use of
Management, Professor of information technology.
Engineering Systems, School of
Engineering and Founding Director,
research consortium Cybersecurity
at MIT Sloan (CAMS)
Faculty
Prof. Susskind's research interests focus on the theory and practice of
negotiation and dispute resolution, the practice of public engagement in local
decision-making, cybersecurity for critical urban infrastructure, entrepreneurial
negotiation, global environmental treaty-making, the resolution of
science-intensive policy disputes, renewable energy policy, water equity in
older American cities, climate change adaptation, socially responsible real
estate development, and the land claims of Indigenous peoples.
Prof. Susskind is the director of the MIT Science Impact Collaborative. He is the
founder of the Consensus Building Institute, a Cambridge-based not-forprofit
Larry Susskind organization that provides mediation services in complex resource
Ford Professor of Urban and management disputes around the world. He is also one of the cofounders of
Environmental Planning, MIT the interuniversity Program on Negotiation at Harvard Law School, where he
Vice Chair and Co-founder, now directs the MIT-Harvard Public Disputes Program, serves as Vice Chair for
Program on Negotiation at Instruction, and leads PON's Master Classes in Negotiation. He is the recipient
Harvard Law School of ACSP's prestigious Educator of the Year Award and recipient of MIT's Award
for Digital Instruction.
Dr. O'Reilly's research group, AnyScale Learning for All, develops new,
data-driven analyses of online coding courses, deep learning techniques for
program representations, adversarial attacks on machine learning models,
model training for adversarial robustness, and cyber hunting tools and cyber
arms race models.
One of the main areas Dr. O'Reilly is investigating is cybersecurity and how to
stop destructive and escalating arms races. She hopes to understand the
nature of adversarial intelligence by computationally replicating it—that is, by
developing "artificial adversarial intelligence." This helps reveal the dynamics of
Una-May O'Reilly conflicting behavior and how adaptation drives it, so that these types of arms
races can be stopped. Dr. O'Reilly holds a Ph.D. from Carleton University in
Principal Research Scientist
Ottawa, Canada.
and Leader of ALFA Group at
MIT-CSAIL
Faculty
Securing information systems is Barbara’s purpose and educating security
professionals is her passion.
Management, Education: BSISE, practitioner. Barbara is a lecturer at MIT Sloan School of Management and a
MBA, (ISC)² Certifications: CISSP courseware developer for the MIT xPro Cyber Program. For (ISC)² CISSP and
and ISSMP, ISACA Certifications: ISSMP: she develops courseware, teaches as a senior and lead instructor,
CISA, CISM, CRISC, CDPSE, Business speaks at Security Congress, and was Chair of (ISC)² Common Body of
Continuity Certifications: CBCP and Knowledge. Furthermore, she imparts ISACA global best practices through its
MBCI CISA, CISM, and CRISC certification classes. As a security educator, she has
readied thousands of security professionals for certification exams.
Howard Shrobe
Principal Research Scientist at the
Massachusetts Institute of
Technology (MIT) Computer Science
and Artificial Intelligence
Laboratory (MIT CSAIL), Cambridge,
Massachusetts
Program Details
Program Fee USD 3,500
(Inclusive of GST, currently @ 18%)
Instalment Schedule
Remarks Fee
Note:
2% finance charge is added to course fee if you pay in instalments.
E
fail; participants must receive 75% to pass and obtain
P L
the certificate of completion.
AM
This is to certify that
Your Name
S
has successfully completed
After successful completion of the program, your verified digital Post Graduate Certificate in
Cybersecurity
certificate will be emailed to you, at no additional cost, with the Date
name you used when registering for the program. All certificate
Sanjay Sarma Dr. Keri Pearlson
images are for illustrative purposes only and may be subject to Vice President for Open Learning Executive Director Cybersecurity at
Massachusetts Institute of Technology MIT Sloan (CAMS) research consortium
About Emeritus
MIT xPRO is collaborating with online education provider Emeritus to offer a portfolio of high-impact online
programs. By working with Emeritus, we are able to broaden access beyond our on-campus offerings in a
collaborative and engaging format that stays true to the quality of MIT xPRO. Emeritus’ approach to learning is
based on a cohort-based design to maximize peer-to-peer sharing and includes live teaching with world-class
faculty and hands-on project-based learning. In the last year, more than 250,000 students from over 80 countries
have benefitted professionally from Emeritus’ courses.
Easily schedule a call with a program advisor
from Emeritus to learn more about this CONNECT WITH A
MIT xPRO program.
PROGRAM ADVISOR
SCHEDULE A CALL
Email: mit@emeritus.org
Phone: +1-65 8014 3066
You can apply for the program here
APPLY
Erulearning Solutions Private Limited (a company incorporated in India) is a subsidiary of Eruditus Learning
Solutions Pte Ltd (a company incorporated in Singapore), and operates under the brand name of ‘Eruditus’
and ‘Emeritus’.