Use coupon code BACK2SCHOOL to save 15%. Exclusions apply

Professional Certificate in Cybersecurity

Delivered in collaboration with Emeritus.

  • TIME COMMITMENT 15-20 hours/week
  • DURATION 24 weeks
  • FORMAT Online
  • PRICE $7,450

WHAT YOU WILL LEARN

MIT xPRO is collaborating with online education provider Emeritus to deliver this online program. By clicking LEARN MORE, you will be taken to a page where you can download the brochure and apply to the program via Emeritus.

If you are interested in taking the program in SPANISH (Certificado Profesional en Ciberseguridad), please visit this page.

If you are interested in taking the program in SIMPLIFIED CHINESE, please visit this page.

  • Explore the basic concepts of computer security systems and their operations
  • Explore the threat landscape and break down the types of threats and vulnerabilities
  • Identify the key components and sequences of incident response frameworks
  • Explore the fundamentals and strategies to protect systems
  • Learn how to identify and test vulnerabilities
  • Gain knowledge of privacy laws, regulatory agencies and resources, and the types of protection they provide
  • Explore the workings of secure communications between computer systems and organizations
  • Learn how attacks are identified and how defensive cybersecurity responses are established
  • Gain knowledge of the functions, strengths and weaknesses, and administration of SOCs
  • Identify key components and sequences of incident response frameworks
  • Learn how virtualization and the cloud are closely associated
  • Gain knowledge and understanding of how to identify and test vulnerabilities
  • See simulated cyberattacks on web application security
  • Learn to identify malicious activities cultivated by human actions
  • Understand privacy policies and how they relate to data governance
  • Learn to identify and mitigate risks associated with Operational Technology (OT) and Internet of Things (IoT) devices
  • Explore artificial intelligence (AI) techniques and how they relate to the cyber environment