Skip to Main Navigation Skip to Secondary Navigation Skip to Tool Navigation
  • Home
  • FAQs
  • Sitemap
  • Search
  • Programs
  • For Individuals
  • For Organizations
  • About Us
  • Contact
MIT Professional Education
Online X Programs
  • Advanced Study Program
  • Short Programs
  • Digital Programs
    • Overview
    • Courses by Topic
    • Contact
  • Custom Programs
  • International Programs
  • Get Email Updates

 

 

Download Course Flyer (pdf)

Link to flyer for Cybersecurity: Technology, Application, and Policy

Digital Programs



CYBERSECURITY

Technology • Applications • Policy

Dates: SEPT. 15 - OCT. 27, 2015 | More dates to be announced
Fee: $545 (introductory price)
CEUs: 2.0

Share |

Course Overview | Earn a Certificate of Completion | Earn CEUs | Course Outline | Instructors | Location

Individual Registrations

Status: Pending. Sign up for email alerts to be notified about the next available sesson
Click here to be notified when registration opens

Course Overview

This online program will explore fundamental technologies and applications in Cybersecurity. By examining security challenges in hardware, software and cryptography, this program will introduce the latest research that can help organizations move from ‘patch and pray’ defenses to security ‘by default’. In addition, this course will also use case studies to illustrate the impact of the emerging technologies and look at the policy implications impacting the field. The program will be taught by a team of world-renowned experts from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL).

The course is held over six weeks and will provide the following:

  • Five modules covering 14 topic areas with 20 hours of video
  • Assessments to reinforce key learning concepts of each module
  • Case studies
  • Discussion Forums for participants to discuss thought provoking questions posed by the MIT faculty teaching the course; share, engage, and ideate with other participants
  • Community Wiki for sharing additional resources, suggested readings, and related links

Participants will also take away:

  • Course materials from all presentations
  • 90 day access to the archived course (includes videos, discussion boards, content, and Wiki)

Individual sessions include:

  • Hardware Architectures for Security
  • Operating System Security
  • Network Security and Protocol Design
  • Secure Programming Languages
  • Verifying Systems
  • Public Key Cryptography
  • Multi-party Computation, Secrecy Sharing, Distributed Trust
  • Homomorphic and Functional Encryption
  • The Landscape of Cyber Policy

In addition, case studies examining the following will be introduced:

  • Bitlocker
  • Resilient Software
  • Web Security
  • Mobile Phone Security

MIT Professional Education Alumni Benefits

After successfully completing Cybersecurity, participants will become alumni of MIT Professional Education and will receive all the associated benefits and courtesies listed below:

  • Receive exclusive discounts on all future Short Programs and Digital Programs courses
  • Access will be provided to our restricted MIT Professional Education alumni group on LinkedIn; this includes invites to join all MIT Professional Education social media platforms
  • Networking opportunities with other individuals from around the globe working in a variety of industries, including technology, computer science, entrepreneurship, science, research, Big Data, and many others
  • Email distribution of our MIT Professional Education newsletter
  • Finally, participants will join the MIT Professional Education alumni mailing list where they will receive advanced notice regarding special announcements on upcoming courses, programs, and events
« Back to Top

Earn a Certificate of Completion

Upon successful completion of the course a Certificate of Completion will be awarded by MIT Professional Education.

To earn a Certificate of Completion in this course, participants should watch all the videos, actively participate in the discussion boards, and complete all assessments by the course end date, with an average of 80 percent success rate.

The Certificate of Completion will be awarded by MIT Professional Education.

Grading: Grades are not awarded for this course.

Sample Certificate of Completion:

sample certificate of completion


« Back to Top

Earn MIT Professional Education Continuing Education Units (CEUs)

Participants of Cybersecurity who successfully complete all course requirements are eligible to receive 2.0 Continuing Education Units (2.0 CEUs).

CEUs are a nationally recognized means of recording non-credit/non-degree study. They are accepted by many employers, licensing agencies, and professional associations as evidence of a participant’s serious commitment to the development of a professional competence.

CEUs are based on hours of instruction. For example: One CEU = 10 hours of instruction.

CEUs may not be applied toward any MIT undergraduate or graduate level course.

« Back to Top

Course Outline

Module One: Introduction

  • Course Introduction – Howard Shrobe
  • Security Overview – Srini Devadas

Module Two: Systems Security

  • Hardware Architectures for security – Howard Shrobe
  • Operating System Security – Frans Kaashoek
  • Network Security and Protocol Design – Dave Clark
  • Verifying Systems – Adam Chlipala
  • Secure Programming Languages – Armando Solar-Lezama

Module Three: Cryptography and Network Security

  • Public Key Cryptography – Ron Rivest
  • Multi-party Computation, Secret Sharing, Distributed Trust – Shafi Goldwasser
  • Homomorphic and Functional Encryption – Vinod Vaikuntanathan

Module Four: Case Studies

  • Bitlocker – Nicolai Zeldovich
  • Resilient Software – Martin Rinard
  • Web Security – Daniel Jackson
  • Mobile Phone Security – Nickolai Zeldovich

Module Five: Policy

  • The Landscape of Cyber Policy – Danny Weitzner
« Back to Top

Instructors

 

Faculty Co-Directors:

Daniela Rus

Daniela Rus
Professor, Electrical Engineering Computer Science, Director, MIT Computer Science and Artificial Intelligence Laboratory

Sam Madden

Howard Shrobe
Principal Research Scientist, MIT Computer Science and Artificial Intelligence Laboratory

 

Additional Faculty Instructors:

Regina Barzilay

Adam Chlipala
Assistant Professor, MIT Computer Science and Artificial Intelligence Laboratory

John Guttag

David Clark
Senior Research Scientist, MIT Computer Science and Artificial Intelligence Laboratory

Piotr Indyk

Srini Devadas
Professor, MIT Computer Science and Artificial Intelligence Laboratory

Tommi Jaakkola

Shafi Goldwasser
Professor, MIT Computer Science and Artificial Intelligence Laboratory

David Karger

Daniel Jackson
Professor, MIT Computer Science and Artificial Intelligence Laboratory

Andrew Lo

Frans Kaashoek
Professor, MIT Computer Science and Artificial Intelligence Laboratory

Ronitt Rubinfeld

Martin Rinard
Professor, MIT Computer Science and Artificial Intelligence Laboratory

Michael Stonebraker

Ronald Rivest
Professor, MIT Computer Science and Artificial Intelligence Laboratory

Matei Zaharia

Armando Solar-Lezama
Assistant Professor, MIT Computer Science and Artificial Intelligence Laboratory

Nickolai Zeldovich

Vinod Vaikuntanathan
Associate Professor, MIT Computer Science and Artificial Intelligence Laboratory

Nickolai Zeldovich

Danny Weitzner
Principal Research Scientist, MIT Computer Science and Artificial Intelligence Laboratory

Nickolai Zeldovich

Nicolai Zeldovich
Associate Professor, MIT Computer Science and Artificial Intelligence Laboratory

« Back to Top
MIT Professional Education

MIT Professional Education
For 65 years MIT Professional Education has been providing a gateway to renowned MIT research, knowledge, and expertise for those engaged in science and technology worldwide, through advanced education programs designed for working professionals. Read more

CSAIL logo

Computer Science and Artificial Intelligence Laboratory (CSAIL)
The Computer Science and Artificial Intelligence Laboratory – known as CSAIL – is the largest research laboratory at MIT and one of the world’s most important centers of information technology research. Read more

« Back to Top

Location

This course takes place online.

« Back to Top

MIT © 2015 Massachusetts Institute of Technology | About this site