Careers360 Logo
Interested in this College?
Get updates on Eligibility, Admission, Placements Fees Structure
Compare

Quick Facts

Medium Of InstructionsMode Of LearningMode Of Delivery
EnglishSelf StudyVideo and Text Based

Course Overview

The Post Graduate Certificate in Cybersecurity Training Course is a 10-month long course that specializes in the domain of cybersecurity. The course provided by MIT xPRO in collaboration with the Emeritus learning platform is open to both working professionals and graduate students. 

Through the Post Graduate Certificate in Cybersecurity Live Course, learners will be introduced to the fundamentals of cybersecurity including defensive and offensive cybersecurity concepts. The course will be delivered by expert MIT faculty.

After successful completion of the Post Graduate Certificate in Cybersecurity Online Course, learners will receive a verified digital certificate by MIT xPRO. The course provides learners with career preparation services and skill workshops.

The Highlights

  • Certificate of completion
  • 10 months duration
  • 10 to 12 hours weekly study
  • Video lectures
  • Expert program leaders
  • Career coaching
  • Case studies from MIT faculty
  • Industry-specific cyber security skills
  • Capstone presentation projects

Programme Offerings

  • Certificate of completion
  • 10 Months Duration
  • 10 to 12 Weekly Study
  • video lectures
  • Expert Program Faculty
  • Capstone Projects
  • Career Preparation Services

Courses and Certificate Fees

Certificate AvailabilityCertificate Providing Authority
yesMIT Cambridge

The Post Graduate Certificate in Cybersecurity Course fee is Rs. 2,87,000. There are flexible payment options available that allow learners to pay the fee through installments. 

Post Graduate Certificate in Cybersecurity Course Fee Structure

Course

Amount

Post Graduate Certificate in Cybersecurity

Rs. 2,87,000


What you will learn

Knowledge of Cyber Security

After completing the Post Graduate Certificate in Cybersecurity Classes, you will gain knowledge about the following topics:

  • Introduction to cybersecurity
  • Defensive cybersecurity
  • Offensive cybersecurity
  • Cybersecurity risk management
  • Identity and Access Management (IAM)
  • Cryptography
  • Cloud security
  • Social engineering
  • Artificial intelligence
  • Privacy and data governance
  • Cybersecurity capstone

Who it is for

  • The course is suitable for mid and senior professionals in information technology who wish to learn about effective strategies in cybersecurity.
  • The course can be opted by early-career professionals and graduates who wish to build a career specialized in cybersecurity.

Admission Details

Given below are the steps to enroll in Post Graduate Certificate in Cybersecurity Online Course:

Step 1: Go to the official website by clicking on the URL given below, https://executive-ed.xpro.mit.edu/post-graduate-certificate-in-cybersecurity

Step 2: Click on the 'Apply Now' option at the end of the page.

Step 3: Create an account and register to continue.

The Syllabus

  • Foundations of cybersecurity
  • Current events
  • Protecting organizations
  • Cybersecurity as risk management
  • Cybersecurity as an organization

  • Basic concepts of cybersecurity
  • Isolation, sharing and access
  • Secure implementation
  • Privilege separation

  • Laws: Federal, State, And International
  • Federal criminal law, data breach
  • Privacy
  • Cybersecurity frameworks : NIST/CIS/SOC GDPR
  • Indian Cybersecurity laws

  • Threats: Disruption Of Operations And Attacks On
  • Internet Of Things (IoT) And Equipment
  • Vulnerabilities : Basic technical attacks
  • Vulnerability analysis and management
  • Social engineering attacks
  • Publicizing threats

  • Initial Communication With A Client Agency
  • Preparing a vulnerability assessment
  • Vulnerability management processes, challenges
  • and opportunities

  • IAM Principles and Concepts
  • Identification
  • Authentication
  • Authorization to Resources and Audit and Accountability
  • Business Context
  • IAM Training and Testing
  • IAM Policy Standards and procedure

  • Session Management
  • Client IAM
  • Network IAM
  • Data IAM Control Techniques
  • Risks and Controls
  • SSO
  • FIM Concepts
  • IAM Industry

  • IAM Role
  • Frameworks
  • Third-party risks
  • Security roles and security organizations
  • Defence in Depth

  • Repercussions of inadequate defence
  • Applying the NIST model
  • Défense in depth
  • Security processes
  • Layers of defence and security processes

  • Networking Communication
  • Securing data
  • Message Authentication code
  • Hash functions
  • Encryptions and signatures
  • Certificates and channels

  • SOC performers services and tools
  • Analysts
  • Reactive and automatic Threat detection
  • Services and tools for threat detection
  • SOC roles and skills

  • IR overview
  • IR Key components(detection and analysis)
  • Containment, Eradication and Recovery
  • Reflection
  • IR Roles and responsibilities

  • Importance of secure administration and
  • the administration role
  • Best practices
  • Combating threats
  • Proactivity
  • Validating

  • Terms and technology
  • Importance of security network administration
  • Strategies of network security administration
  • Standard policies and frameworks

  • Cloud computing
  • Cloud services models and deployment
  • Security and infrastructure management
  • Role of cloud in zero-trust security
  • Ransomware
  • Cloud security alliance (CSA)
  • Cloud Controls Matrix
  • Azure vs AWS vs GCP

  • Terms and technology
  • Importance of security network administration
  • Strategies of network security administration
  • Standard policies and frameworks

  • Security architecture and strategy
  • Threat modelling
  • The Red Team and penetration testing
  • NIST CSF and offensive cybersecurity
  • The Attacker mindset
  • Security assessment, evaluation and testing cycle

  • Intro to penetration testing
  • Concepts and foundations
  • Why penetration testing is conducted
  • When is Penetration testing performed
  • Frameworks of penetration testing
  • Penetration testing professionals

  •  Penetration Testing planning, goals, objectives and scope
  • Discovery and reconnaissance
  • Enumeration
  • Vulnerability mapping
  • Access
  • Red Team/Blue team
  • Reporting

  • Social Engineering concepts
  • Types of social engineering
  • Phishing and its variants
  • Email hacks
  • Reducing risk
  • Social engineering: roles and responsibilities

  • AI and ML
  • Settings and challenges
  • Malware detection
  • Models and neural networks
  • Preparation and modifications

  • Principles and laws
  • Data breaches
  • Terms
  • Design approaches
  • Privacy impact assessments

  • IOT and OT concepts
  • Problems with IOT
  • Vulnerabilities of IOT, Operational Technology (OT)
  • Mitigations

  • Concluding topics
  • Cybersecurity toolkit
  • Positions and skills
  • Professional advice

Instructors

MIT Cambridge Frequently Asked Questions (FAQ's)

1: What is the total duration of the Post Graduate Certificate in Cybersecurity Course?

The Post Graduate Certificate in Cybersecurity Live Course can be completed within a duration of 10 months.

2: How much time is required on a weekly basis for the course?

The course requires 10 to 12 study hours on a weekly basis.

3: Does the course provide a certificate in the end?

Yes, all learners who successfully complete the Post Graduate Certificate in Cybersecurity Online Course will receive a valid digital certificate.

4: What is the cut off percentage to pass the course?

Students should score 75% to qualify for the course certificate.

5: On which platform is the Post Graduate Certificate in Cybersecurity Course available?

The course is provided by MIT xPRO in collaboration with the program partner, Emeritus.

Articles

Back to top