Course Highlights
  • Certificate of completion
  • 10 months duration
  • 10 to 12 hours weekly study
  • Video lectures
  • Expert program leaders
  • Career coaching
  • Case studies from MIT faculty
  • Industry-specific cyber security skills
  • Capstone presentation projects
Curriculum

5 Topics
Foundations of cybersecurity
Current events
Protecting organizations
Cybersecurity as risk management
Cybersecurity as an organization

4 Topics
Basic concepts of cybersecurity
Isolation; sharing and access
Secure implementation
Privilege separation

5 Topics
Laws: Federal; State; and International
Federal criminal law; data breach
Privacy
Cybersecurity frameworks : NIST/CIS/SOC GDPR
Indian Cybersecurity laws

6 Topics
Threats: Disruption Of Operations and Attacks On
Internet Of Things (IoT) And Equipment
Vulnerabilities : Basic technical attacks
Vulnerability analysis and management
Social engineering attacks
Publicizing threats

4 Topics
Initial Communication With A Client Agency
Preparing a vulnerability assessment
Vulnerability management processes; challenges
and opportunities

7 Topics
IAM Principles and Concepts
Identification
Authentication
Authorization to Resources and Audit and Accountability
Business Context
IAM Training and Testing
IAM Policy Standards and procedure

8 Topics
Session Management
Client IAM
Network IAM
Data IAM Control Techniques
Risks and Controls
SSO
FIM Concepts
IAM Industry

5 Topics
IAM Role
Frameworks
Third-party risks
Security roles and security organizations
Defence in Depth

5 Topics
Repercussions of inadequate defence
Applying the NIST model
Défense in depth
Security processes
Layers of defence and security processes

6 Topics
Networking Communication
Securing data
Message Authentication code
Hash functions
Encryptions and signatures
Certificates and channels

5 Topics
SOC performers services and tools
Analysts
Reactive and automatic Threat detection
Services and tools for threat detection
SOC roles and skills

6 Topics
IR overview
IR Key components(detection and analysis)
Containment
Eradication and Recovery
Reflection
IR Roles and responsibilities

5 Topics
Importance of secure administration and the administration role
Best practices
Combating threats
Proactivity
Validating

4 Topics
Terms and technology
Importance of security network administration
Strategies of network security administration
Standard policies and frameworks

7 Topics
Cloud services models and deployment
Security and infrastructure management
Role of cloud in zero-trust security
Ransomware
Cloud security alliance (CSA)
Cloud Controls Matrix
Azure vs AWS vs GCP

4 Topics
Terms and technology
Importance of security network administration
Strategies of network security administration
Standard policies and frameworks

6 Topics
Security architecture and strategy
Threat modelling
The Red Team and penetration testing
NIST CSF and offensive cybersecurity
The Attacker mindset
Security assessment; evaluation and testing cycle

6 Topics
Intro to penetration testing
Concepts and foundations
Why penetration testing is conducted
When is Penetration testing performed
Frameworks of penetration testing
Penetration testing professionals

7 Topics
Penetration Testing planning; goals; objectives and scope
Discovery and reconnaissance
Enumeration
Vulnerability mapping
Access
Red Team/Blue team
Reporting

6 Topics
Social Engineering concepts
Types of social engineering
Phishing and its variants
Email hacks
Reducing risk
Social engineering: roles and responsibilities

5 Topics
AI and ML
Settings and challenges
Malware detection
Models and neural networks
Preparation and modifications

5 Topics
Principles and laws
Data breaches
Terms
Design approaches
Privacy impact assessments

4 Topics
IOT and OT concepts
Problems with IOT
Vulnerabilities of IOT; Operational Technology (OT)
Mitigations

4 Topics
Concluding topics
Cybersecurity toolkit
Positions and skills
Professional advice

  Write a Review

Post Graduate Certificate in Cybersecurity

Go to Paid Course