The Post Graduate Certificate in Cybersecurity Training Course is a 10-month long course that specializes in the domain of cybersecurity. The course provided by MIT xPRO in collaboration with the Emeritus learning platform is open to both working professionals and graduate students.
Through the Post Graduate Certificate in Cybersecurity Live Course, learners will be introduced to the fundamentals of cybersecurity including defensive and offensive cybersecurity concepts. The course will be delivered by expert MIT faculty.
After successful completion of the Post Graduate Certificate in Cybersecurity Online Course, learners will receive a verified digital certificate by MIT xPRO. The course provides learners with career preparation services and skill workshops.
The Post Graduate Certificate in Cybersecurity Course fee is Rs. 2,87,000. There are flexible payment options available that allow learners to pay the fee through installments.
Post Graduate Certificate in Cybersecurity Course Fee Structure
Course
Amount
Post Graduate Certificate in Cybersecurity
Rs. 2,87,000
What you will learn
Knowledge of Cyber Security
After completing the Post Graduate Certificate in Cybersecurity Classes, you will gain knowledge about the following topics:
Introduction to cybersecurity
Defensive cybersecurity
Offensive cybersecurity
Cybersecurity risk management
Identity and Access Management (IAM)
Cryptography
Cloud security
Social engineering
Artificial intelligence
Privacy and data governance
Cybersecurity capstone
Who it is for
The course is suitable for mid and senior professionals in information technology who wish to learn about effective strategies in cybersecurity.
The course can be opted by early-career professionals and graduates who wish to build a career specialized in cybersecurity.
Admission Details
Given below are the steps to enroll in Post Graduate Certificate in Cybersecurity Online Course:
Step 1: Go to the official website by clicking on the URL given below, https://executive-ed.xpro.mit.edu/post-graduate-certificate-in-cybersecurity
Step 2: Click on the 'Apply Now' option at the end of the page.
Step 3: Create an account and register to continue.
The Syllabus
Foundations of cybersecurity
Current events
Protecting organizations
Cybersecurity as risk management
Cybersecurity as an organization
Basic concepts of cybersecurity
Isolation, sharing and access
Secure implementation
Privilege separation
Laws: Federal, State, And International
Federal criminal law, data breach
Privacy
Cybersecurity frameworks : NIST/CIS/SOC GDPR
Indian Cybersecurity laws
Threats: Disruption Of Operations And Attacks On
Internet Of Things (IoT) And Equipment
Vulnerabilities : Basic technical attacks
Vulnerability analysis and management
Social engineering attacks
Publicizing threats
Initial Communication With A Client Agency
Preparing a vulnerability assessment
Vulnerability management processes, challenges
and opportunities
IAM Principles and Concepts
Identification
Authentication
Authorization to Resources and Audit and Accountability
Business Context
IAM Training and Testing
IAM Policy Standards and procedure
Session Management
Client IAM
Network IAM
Data IAM Control Techniques
Risks and Controls
SSO
FIM Concepts
IAM Industry
IAM Role
Frameworks
Third-party risks
Security roles and security organizations
Defence in Depth
Repercussions of inadequate defence
Applying the NIST model
Défense in depth
Security processes
Layers of defence and security processes
Networking Communication
Securing data
Message Authentication code
Hash functions
Encryptions and signatures
Certificates and channels
SOC performers services and tools
Analysts
Reactive and automatic Threat detection
Services and tools for threat detection
SOC roles and skills
IR overview
IR Key components(detection and analysis)
Containment, Eradication and Recovery
Reflection
IR Roles and responsibilities
Importance of secure administration and
the administration role
Best practices
Combating threats
Proactivity
Validating
Terms and technology
Importance of security network administration
Strategies of network security administration
Standard policies and frameworks
Cloud computing
Cloud services models and deployment
Security and infrastructure management
Role of cloud in zero-trust security
Ransomware
Cloud security alliance (CSA)
Cloud Controls Matrix
Azure vs AWS vs GCP
Terms and technology
Importance of security network administration
Strategies of network security administration
Standard policies and frameworks
Security architecture and strategy
Threat modelling
The Red Team and penetration testing
NIST CSF and offensive cybersecurity
The Attacker mindset
Security assessment, evaluation and testing cycle
Intro to penetration testing
Concepts and foundations
Why penetration testing is conducted
When is Penetration testing performed
Frameworks of penetration testing
Penetration testing professionals
Penetration Testing planning, goals, objectives and scope
Discovery and reconnaissance
Enumeration
Vulnerability mapping
Access
Red Team/Blue team
Reporting
Social Engineering concepts
Types of social engineering
Phishing and its variants
Email hacks
Reducing risk
Social engineering: roles and responsibilities
AI and ML
Settings and challenges
Malware detection
Models and neural networks
Preparation and modifications
Principles and laws
Data breaches
Terms
Design approaches
Privacy impact assessments
IOT and OT concepts
Problems with IOT
Vulnerabilities of IOT, Operational Technology (OT)
Mitigations
Concluding topics
Cybersecurity toolkit
Positions and skills
Professional advice
Instructors
MIT Cambridge Frequently Asked Questions (FAQ's)
1: What is the total duration of the Post Graduate Certificate in Cybersecurity Course?
The Post Graduate Certificate in Cybersecurity Live Course can be completed within a duration of 10 months.
2: How much time is required on a weekly basis for the course?
The course requires 10 to 12 study hours on a weekly basis.
3: Does the course provide a certificate in the end?
Yes, all learners who successfully complete the Post Graduate Certificate in Cybersecurity Online Course will receive a valid digital certificate.
4: What is the cut off percentage to pass the course?
Students should score 75% to qualify for the course certificate.
5: On which platform is the Post Graduate Certificate in Cybersecurity Course available?
The course is provided by MIT xPRO in collaboration with the program partner, Emeritus.