MIT Cybersecurity Master Program v13
MIT Cybersecurity Master Program v13
MIT Cybersecurity Master Program v13
CYBER SECURITY
About Simplilearn............................................................................... 6
Program Outcomes............................................................................ 10
Courses
Certificates............................................................................................ 22
About the Program
3|
Key Features of the Post Graduate
Program in Cyber Security
Certification Community
• Overall Program MIT CSAIL Professional
Completion: Simplilearn Programs Community
Membership MIT
• ‘Cyber Security:
CSAIL Professional
Technology, Application
Programs Community
and Policy’ Module: MIT
Membership
• Certified Ethical Hacker:
EC Council
4|
About the Post Graduate Program
in Cyber Security
This Post Graduate Program in Cyber Security equip you with the skills needed
to become an expert in this rapidly growing domain. This program also contains
two major modules from MIT SCoC and EC- Council which helps to develop a
360-degree view of the cybersecurity domain that now comprises a wide array of
security components and technologies.
MIT also places among the top five in many overall rankings of universities along
with Times Higher Education has recognized MIT as one of the world’s “six super
brands” on its World Reputation Rankings. In 2019, it ranked 3rd among the
universities around the world by SCImago Institutions Rankings.In 2017, the Times
Higher Education World University Rankings rated MIT the #2 university for arts
and humanities. MIT was ranked #7 in 2015 and #6 in 2017 of the Nature Index
Annual Tables, which measure the largest contributors to papers published in 82
leading journals.
About EC Council:
5|
are ANSI accredited.Many of these certifications are recognized worldwide and
have received endorsements from various government agencies including the
U.S. Federal Government via the Montgomery GI Bill, National Security Agency
(NSA), and the Committee on National Security Systems (CNSS).
About Simplilearn
Simplilearn is a leader in digital skills training, focused on the emerging
technologies that are transforming our world. Our unique Blended Learning
approach drives learner engagement and is backed by the industry’s highest
course completion rates. Partnering with professionals and companies, we
identify their unique needs and provide outcome-centric solutions to help
them achieve their professional goals.
6|
Program Eligibility Criteria and
Application Process
Those wishing to enroll in this Post Graduate Program in Cyber Security
will be required to apply for admission.
Eligibility Criteria
For admission to this Post Graduate Program in Cyber Security, candidates:
Application Process
The application process consists of three simple steps. An offer of admission will be
made to the selected candidates and accepted by the candidates upon payment of
the admission fee.
Submit an Application
Admission
Application Review
Complete the application and After you submit your An offer of admission will be
include a brief statement of application, a panel of admissions made to qualified candidates.
purpose to tell our admissions counselors will review your You can accept this offer by
counselors why you’re interested application and statement of paying the program fee.
and qualified for this Post purpose to determine your
qualifications and interest in the
Graduate Program in Cyber
program.
Security.
7|
Talk to an Admissions Counselor
We have a team of dedicated admissions counselors who are
here to help guide you in the application process and related
matters. They are available to:
8|
Learning Path Visualization
1 Introduction to Cybersecurity
Cybersecurity- Technology,
5 Application and Policy (From )
Cybersecurity-
6 Capstone Project
7 PGP Certificate
9|
Program Outcomes
At the end of this Post Graduate Program,
you will be equipped with the following skillsets:
10 |
Who Should Enroll in this Program?
This program caters to those who are hoping to enter the world of Cyber
Security or want to update their skills, as it is designed and structured to
accommodate various professional backgrounds. Although there are no
prerequisites for taking this training program, individuals in the following
roles and disciplines are ideal for this course:
11 |
STEP
01
Introduction to Cybersecurity
Course curriculum
12 |
STEP
02
This course will enable learners to gain knowledge and skills required
to install and configure systems to secure applications, networks, and
devices; perform threat analysis and respond with appropriate mitigation
techniques; participate in risk mitigation activities; operate with an
awareness of applicable policies, laws, and regulations. Upon successfully
validating their skills by passing the certification exam learners will be
able to perform these tasks to support the principles of confidentiality,
integrity, and availability. CompTIA Security+ meets the ISO 17024
standard and is approved by the U.S.
13 |
Course curriculum
14 |
STEP
03
Course curriculum
15 |
Lesson 02: Asset Security - Learn how to classify information,
protect privacy, maintain ownership, establish handling
requirements
Lesson 03: Security Engineering - Understand security engineering
processes using secure design principles, Architecture Frameworks,
Security Models Evaluation Criteria, Distributed Systems, and many
more
Lesson 04: Communications and Network Security - Learn
how to secure network architecture, design, components, and
communication channels
Lesson 05: Identity and Access Management - Implement and
manage authorization mechanisms to prevent or mitigate access
control attacks
Lesson 06: Security Assessment and Testing - Learn how to design
and validate assessment and test strategies
Lesson 07: Security Operations - Understand and support
requirements for investigations by implementing resource
protection techniques and incident response
Lesson 08: Software Development Security - Comprehend the
system life cycle and system development in this lesson
16 |
STEP
04
Course curriculum
17 |
Module 03: Scanning Networks - Learn about network scanning
concepts, tools and techniques, network diagrams, and scanning
pen testing
Module 04: Enumeration - Enumeration concepts, types,
techniques, and pen testing are covered in this module
Module 05: Vulnerability Analysis - Overview of vulnerability
assessment concepts, solutions, scoring systems, tools, and reports
are explained in this module
Module 06: System Hacking - Learn how to crack passwords, hide
files, cover tracks, any many more
Module 07: Malware Threats - This module gets you familiar
with malware concepts, trojan concepts, malware analysis,
countermeasures, malware penetration testing
Module 08: Sniffing - Sniffing concepts, tools, and techniques are
explained in this module
Module 09: Social Engineering - Comprehend social engineering
concepts, techniques, countermeasures, and pen testing
Module 10: Denial-of-service - Dos/DDoS concepts, techniques,
tools, case studies, and penetration testing are covered in this
module
Module 11: Session Hijacking - Know what is session hijacking and
its types, tools, countermeasures, and session hijacking penetration
testing
Module 12: Evading IDS, Firewalls, and Honeypots - Learn about
firewalls and honeypots and how to detect and evade them
Module 13: Hacking Web Servers - This module focuses on web
server concepts, attacks, methodologies, tools, countermeasures,
and penetration testing
Module 14: Hacking Web Applications - Web app concepts, tools,
methodologies, countermeasures, and penetration testing are
covered in this module
18 |
Module 15: SQL Injection - Get familiar with SQL Injection
concepts,types, tools, methodologies, countermeasures, and
penetration testing
Module 16: Hacking Wireless Networks - Wireless concepts, threats,
methodologies are covered in this module
Module 17: Hacking Mobile Platforms - Learn how to hack android
IOS, Mobile spyware, device management, security tools, and many
more in this module
Module 18: IoT Hacking - This module covers IoT Hacking concepts,
attacks, methodologies, tools, countermeasures, and penetration
testing Module 19: Cloud Computing - Concepts, attacks,
methodologies, tools, countermeasures, and penetration testing of
cloud computing are covered in this module
Module 20: Cryptography - This module will teach you about
cryptography concepts, encryption algorithms, tools, PKI, types of
encryption, cryptanalysis, and countermeasures
19 |
STEP
05
This course would be conducted by the 15 MIT expert instructor and will
target the participants to learn the state-of-the-art in cybersecurity. The
course aims to reduce the time from research to industry dissemination
and expose the participants to some of the most recent ideas and
techniques in cybersecurity.
20 |
New approaches to secure computation: multi-party computing,
secret sharing, distributed trust
New methods for computing on encrypted data
Network security and protocol design
Course curriculum
Lesson 1: Introduction
Lesson 2: Systems Security
Lesson 3: Cryptography and Network
Lesson 4: Case Studies
Lesson 5: Policy
21 |
STEP
06
22 |
Certifications
Upon completion of this Post Graduate Program in Cyber Security,
you will receive :
Security: Technology,
This is to certify that Application and Policy’ is
PL
Program delivered by
Daniela Rus
Director, MIT CSAIL
Course Faculty Director
23 |
INDIA
Simplilearn Solutions Pvt Ltd.
# 53/1 C, Manoj Arcade, 24th Main,
Harlkunte
2nd Sector, HSR Layout
Bangalore - 560102
Call us at: 1800-212-7688
USA
Simplilearn Americas, Inc.
201 Spear Street, Suite 1100,
San Francisco, CA 94105
United States
Phone No: +1-844-532-7688
www.simplilearn.com
24 |