phone iconSpeak with our expert +1 410 835 4326

Delivered in collaboration with Great Learning

Learn more about the course

Get details on syllabus, projects, tools, and more

Name
Email
Mobile Number

By submitting this form, you consent to our Terms of Use & Privacy Policy and to be contacted by us via Email/Call/Whatsapp/SMS.

Professional Certificate in Cybersecurity: IT and Data Security in the Age of AI

Professional Certificate in Cybersecurity: IT and Data Security in the Age of AI

Application closes 12th Feb 2026

overview icon

PROGRAM OUTCOMES

Elevate your career

With actionable cybersecurity skills

  • List icon

    Understand foundational and core cybersecurity principles

  • List icon

    Learn to implement security controls for protecting enterprise networks

  • List icon

    Evaluate cloud security and develop comprehensive strategies for cloud data security

  • List icon

    Learn how AI-driven tools are used in cybersecurity through practical use cases

  • List icon

    Learn how to implement unified control programs that cover multiple compliance standards

Earn a certificate from Johns Hopkins University

  • #6 National University Rankings

    #6 National University Rankings

    U.S. News & World Report, 2025

  • #13 Best Global University

    #13 Best Global University

    U.S. News & World Report, 2024

  • #1 Computer Information Technology

    #1 Computer Information Technology

    U.S. News & World Report, 2025

  • #1 Biomedical Engineering Program

    #1 Biomedical Engineering Program

    US News and World Report

KEY PROGRAM HIGHLIGHTS

Why choose this program

  • List icon

    Industry-focussed curriculum

    Master network and infrastructure security, cloud security posture improvement, learn about AI solutions for cybersecurity and more.

  • List icon

    Prepare for top certification exams

    Gain a strong knowledge base and practical grounding for certifications like (ISC)² CISSP and CompTIA Security+ .

  • List icon

    Flexible learning format

    Learn through recorded lectures, monthly live masterclasses by JHU faculty, interactive mentored sessions, and AI-powered learning tools.

  • List icon

    Hands-on learning

    Work on real-world case studies, projects, and hands-on lab activities to build practical cybersecurity skills that employers look for.

  • List icon

    Get expert mentorship

    Gain insights from industry practitioners in cybersecurity, refine your projects and set yourself up for success in the field.

  • List icon

    Personalized program support

    Receive 1:1 guidance from a dedicated Program Manager and academic support from cybersecurity experts.

Skills you will learn

RISK ASSESSMENT AND MANAGEMENT

NETWORK SECURITY

CLOUD SECURITY

MALWARE ANALYSIS

SECURE SOFTWARE DEVELOPMENT

IDENTITY AND ACCESS MANAGEMENT (IAM)

INCIDENT RESPONSE AND FORENSICS

MANAGING SECURITY ASSESSMENTS

FEDERAL FRAMEWORK COMPLIANCE READINESS

RISK ASSESSMENT AND MANAGEMENT

NETWORK SECURITY

CLOUD SECURITY

MALWARE ANALYSIS

SECURE SOFTWARE DEVELOPMENT

IDENTITY AND ACCESS MANAGEMENT (IAM)

INCIDENT RESPONSE AND FORENSICS

MANAGING SECURITY ASSESSMENTS

FEDERAL FRAMEWORK COMPLIANCE READINESS

view more

  • Overview
  • Learning Journey
  • Curriculum
  • Tools
  • Certificate
  • Faculty
  • Mentors
  • Fees
  • FAQ
optimal icon

This program is ideal for

Professionals looking to advance their careers with cybersecurity skills

  • Mid-senior IT professionals & engineers

    Seeking to upskill in cybersecurity and prepare for roles like cybersecurity architects, senior engineers, or those on a CTO track

  • Early to mid-career cyber professionals

    Who want to upskill, stay ahead of evolving threats, and transition into mid-senior cybersecurity roles

  • Technology leaders and decision-makers

    Including CISOs, aiming to strengthen cybersecurity and AI-power teams for threat detection, risk management, and automation

  • Architects & technology consultants

    Suited for professionals with strong technical backgrounds seeking comprehensive cybersecurity expertise in their domain

Experience a unique learning journey

Our pedagogy is designed to ensure career growth and transformation

  • banner-image

    Learn with self-paced videos

    Learn critical concepts from video lectures by faculty & AI experts

  • banner-image

    Engage with your mentors

    Clarify your doubts and gain practical skills during the weekend mentorship sessions

  • banner-image

    Work on hands-on projects

    Work on projects to apply the concepts & tools learnt in the module

  • banner-image

    Get personalized assistance

    Our dedicated program managers will support you whenever you need

Syllabus designed for professionals

Learn from world-renowned Johns Hopkins University faculty who designed and deliver this curriculum. The program aligns with CompTIA Security+ and CISSP, covering core domains like risk management and cloud security. While not official certification training, it builds the essential competencies needed to pursue these global exams with confidence.

PRE-WORK: PREPARATORY MODULE

The outcome of this module is to get set up with all the tools you need for the learning journey and build a solid foundation in three essential domains: operating systems, applications & APIs, and cloud computing.  Pre-work 1: Getting Set Up for the Learning Journey  Pre-work 2: Operating Systems  Pre-work 3: Application Basics and API  Pre-work 4: Foundations of AI and Cloud

MODULE 01: FOUNDATIONS OF INFORMATION SECURITY

In this module, learners will explore the foundational principles of cybersecurity, including key frameworks, types of risks and how to manage them, and core protection mechanisms for the enterprise infrastructure. They will understand how cryptography, authentication, and security standards safeguard data while gaining insight into the evolving threat landscape and common cyberattacks that shape modern defense strategies.   Sample Project: Practicing Cryptography with CyberChef  Sample Project: Ransomware Threat Analysis Using Reverse Engineering  Sample Lab Activity: Attacking Passwords With Various Tools

WEEK 1: CORE CYBERSECURITY PRINCIPLES

In this week, learners will explore the foundational principles of cybersecurity, including the CIA Triad, non-repudiation, privacy, and the principle of least privilege. They will understand how layered defense strategies (defense in depth) and the IAAA model ensure secure access and accountability. The week also introduces cryptography and authentication mechanisms, covering encryption fundamentals, digital signatures, certificates, and modern authentication techniques. Sample Case Study: Data Protection & Risk Management Topics Covered: CIA Triad (Confidentiality, Integrity, Availability)  Identity, Authentication, Authorization & Accountability (IAAA)  Non-Repudiation and Privacy Principles  Principle of Least Privilege  Defense in Depth  Basics of Cryptography  Post-Quantum Cryptography  Digital Signatures and Certificates  Authentication Techniques

WEEK 2: RISK MANAGEMENT FRAMEWORKS

In this week, learners will be introduced to a skill that is essential for every cybersecurity professional: risk management. Learners will explore different strategies for managing risks, such as risk identification, assessment, mitigation, and response strategies. They will learn to establish unified control programs, maintain security baselines, and implement continuous security monitoring for ongoing improvement. The week also introduces learners to the most significant frameworks used by the entire cybersecurity industry, including the NIST Cybersecurity Framework 2.0, the Risk Management Framework (RMF), and CMMC compliance, to ensure structured and resilient security governance. Sample Case Study: Nation-State Espionage Topics Covered: NIST Cybersecurity Framework 2.0  Risk Management Framework (RMF)  Introduction to CMMC Compliance  Risk Identification, Assessment, and Mitigation  Risk Responses  Unified Control Programs  Continuous Monitoring and Improvement  Security Baseline

WEEK 3: CYBER ATTACKS AND THREAT LANDSCAPE

In this week, learners will examine the evolving cybersecurity threat landscape through real-world adversarial tactics and frameworks such as MITRE ATT&CK. They will analyze diverse threat actors, including nation-state groups, organized cybercrime, and AI-powered attacks, alongside risks arising from supply chains and third-party dependencies. The week also provides an in-depth understanding of major cyberattack types: social engineering, network-based, endpoint, malware, ransomware, and data breach attacks, enabling learners to recognize, assess, and respond to modern threat scenarios effectively. Sample Case Study: Cyber Threat Operations & Social Engineering Topics Covered: MITRE ATT&CK Framework  Nation-State Sponsored Adversaries  Organized Cybercrime  AI-Powered Threats  Supply Chain Threats  Third-Party Risks  Social Engineering Attacks  Network-Based Attacks  Attacks on Endpoints  AI-Generated Malware Attacks & Malware Analysis  Ransomware Attacks  Data Breaches and Manipulation

WEEK 4: LEARNING BREAK

MODULE 02: NETWORK & INFRASTRUCTURE SECURITY

In this module, learners will explore secure network design using Zero Trust and next-generation firewalls, supported by a refresher on network basics and incident response. They will gain hands-on skills in vulnerability management with tools like Nessus and ACAS, assess risks, apply patch management practices, and ensure compliance using SRGs and STIGs. Sample Project: Analyzing Network Traffic with Wireshark  Sample Lab Activity: Vulnerability Management Using Nessus  Sample Project: Assessing Risks Identified During the Pentest  Sample Lab Activity: Configuring a pfSense Firewall

WEEK 5: SECURITY ARCHITECTURE

In this week, learners will refresh core computer networking concepts and explore modern security models like Zero Trust Network Architecture. They will understand the role of next-generation firewalls in perimeter defense and gain an introduction to incident response processes. The week also highlights how AI enhances incident analysis and response for faster, smarter threat mitigation Sample Case Study: Supply-Chain & Application Security  Sample Case Study: Ransomware & Cybercrime Intelligence Topics Covered  Refreshing Computer Network Basics  Zero Trust Network Architecture  Next-Generation Firewalls  Virtual Private Network  Introduction to Incident Response  Using AI for Incident Analysis & Response

WEEK 6: VULNERABILITY MANAGEMENT

In this week, learners will develop practical skills in vulnerability management using tools such as Nessus to identify and assess security weaknesses. They will perform IT and cybersecurity vulnerability-level risk assessments and apply effective patch management strategies. Government organizations adhere to Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs) to ensure strict compliance, secure configurations, and alignment with the Department of Defense’s cybersecurity standards. Learners will also understand the process involved in SRGs and STIGs, reinforcing system security and organizational resilience. Sample Case Study: Supply-Chain & Network Security Topics Covered: Vulnerability Management (Nessus)  Detecting Shadow AI with Nessus  ACAS (Assured Compliance Assessment Solution)  Performing IT and Cybersecurity Vulnerability-Level Risk Assessments  Patch Management  Security Requirements Guides (SRGs)  Security Technical Implementation Guides (STIGs) 

MODULE 03: CLOUD AND DATA SECURITY

In this module, learners will gain a solid understanding of secure cloud design, including core architecture principles, identity management, and best practices for data protection. They will explore cloud security posture, resilience strategies, and modern approaches to automated, compliant cloud deployments, equipping them to build and secure scalable cloud environments across public and government cloud platforms. Sample Lab Activity: Deploying and Securing Assets in AWS Sample Project: Using S3 Buckets for Secure Storage of Sensitive Data

WEEK 7: CLOUD FUNDAMENTALS & SECURE CLOUD DESIGN

In this week, learners will explore the foundations of cloud computing and understand how secure cloud architectures are built. They will examine native cloud security services, identity and access management (IDAM), and the best practices defined by the Cloud Security Alliance to ensure robust and compliant cloud environments. Sample Case Study: Cloud Infrastructure & DDoS Protection Topics Covered: Cloud Computing Definitions  Secure Cloud Architecture  Cloud Native Security Services  Cloud Security Alliance  IDAM in Cloud

WEEK 8: CLOUD POSTURE AND SECURITY

In this week, learners will focus on maintaining strong cloud security through continuous posture monitoring and resilience planning, supported by a case study on an AWS outage. They will explore best practices in AWS security, government cloud environments, and key security controls. The week also introduces Infrastructure as Code (IaC) for automating secure and repeatable cloud deployments. Sample Case Study: Cloud Resilience & Incident Response Topics Covered  Cloud Security Posture Monitoring  Resilience in Cloud (Case Study: Massive Internet Outage Because of AWS Unavailability)  AWS GovCloud (US) and Azure Government Cloud  Cloud Security Best Practices (AWS)  Cloud Security Controls  Infrastructure as Code (IaC) for Secure, Repeatable Cloud Deployments

WEEK 9: CLOUD DATA SECURITY

In this week, learners will explore how to classify and secure cloud data across various storage types using techniques like encryption, masking, and anonymization. They will also examine AI-powered data classification and the role of confidential computing in protecting data while it is being processed. Sample Case Study: Cloud Security & Data Protection  Topics Covered:  Data Classification and Securing Specific Storage Types  Data Protection Mechanisms on Cloud (Encryption, Masking, and Anonymization)  AI-Powered Data Classification  Confidential Computing (Protection for Data In-Use)

WEEK 10: LEARNING BREAK

MODULE 04: GOVERNANCE, RISK, AND COMPLIANCE (GRC)

In this module, learners will gain a foundational understanding of governance in cybersecurity, focusing on key compliance standards and their role in risk reduction. They will also learn the essentials of audit management to ensure accountability, control effectiveness, and regulatory alignment within organizations. Sample Project: Perform a Compliance Scan with Nessus  Sample Project: Conduct a Risk Assessment according to NIST RMF

WEEK 11: FUNDAMENTALS OF GRC

In this week, learners will dive into key GRC frameworks and principles that shape organizational security. They will explore major policies and privacy regulations, including GDPR, PCI DSS, FedRAMP, and CMMC Levels 1 and 2, gaining practical insights into data protection and compliance. Sample Case Study: Governance, Risk & Compliance (GRC) Topics Covered: GRC Frameworks and Principles  Policy and Privacy, Regulation, and Data Governance  GDPR  PCI/DSS  FedRAMP  CMMC Compliance (Level 1 & Level 2)

WEEK 12: AUDIT MANAGEMENT

In this week, learners will understand the audit lifecycle and its role in maintaining cybersecurity compliance. They will explore internal and external audit practices, learn how certification audits are conducted, and examine key governance activities, including third-party risk management, to ensure accountability across the supply chain. Topics Covered:  Understanding Audit Process  Role of Internal and External Audits in Compliance  Conducting an Internal Audit  Certification Audits  Governance Activities  Third-Party Risk Management

MODULE 05: AI-POWERED CYBER DEFENCE

In this module, learners will build a foundational understanding of artificial intelligence and explore its transformative applications in cybersecurity, including threat detection, automated defense, and secure AI system design. Sample Project: Using GenAI for Cyber Offense and Defense

WEEK 13: FUNDAMENTALS OF AI AND GENERATIVE AI

In this week, learners will be introduced to the fundamentals of artificial intelligence and large language models (LLMs), with a focus on their applications in cybersecurity. They will explore real-world GenAI use cases, understand security risks through the OWASP Top 10 for LLMs, and learn about essential AI governance practices to ensure safe and ethical deployment. Sample Case Study: AI Platform Security  Topics Covered: Introduction to Artificial Intelligence  Introduction to LLM  GenAI Use Cases for Cybersecurity  OWASP Top 10 for LLM  AI Governance

WEEK 14: APPLICATIONS OF AI IN CYBERSECURITY

In this week, learners will explore how AI is applied to real-world cybersecurity challenges, including threat detection and automated defense. They will examine agentic AI tools such as Darktrace, understand the role of LLM firewalls in securing AI systems, and learn responsible AI practices to mitigate bias and hallucination risks. Topics Covered: Applied AI in Cybersecurity  Agentic AI for Security (Darktrace)  LLM Firewall  Responsible AI Practices: Bias & Hallucination

Master in-demand cybersecurity tools

Tools and techniques you will learn in this cybersecurity course

  • tools-icon

    Nessus

  • tools-icon

    Wireshark

  • tools-icon

    CyberChef

  • tools-icon

    shodan.io

  • tools-icon

    OpenAI

  • tools-icon

    pfsense

  • tools-icon

    NotebookLM

Earn a professional cybersecurity certificate from Johns Hopkins University

Get a certificate of completion from Johns Hopkins University (with 11 Continuing Education Units - CEUs)

certificate image

* Image for illustration only. Certificate subject to change.

Meet your faculty

Learn from world-renowned JHU faculty

  • Thomas Byrd, JD.  - Faculty Director

    Thomas Byrd, JD.

    Professor – Johns Hopkins University

    Ex-VP & Enterprise Security, Senior Cybersecurity Manager – T. Rowe Price

    Cyber leader at the FBI and Department of Defense, he has played a key role in advancing US government cyber capabilities.

    Know More
    Company Logo
  • Dr. Lanier Watkins  - Faculty Director

    Dr. Lanier Watkins

    Principal Cybersecurity Research Professor - Johns Hopkins University

    Holds a PhD in Computer Science and 3 MS degrees (Biotechnology, Computer Science, and Physics)

    Published over 60 papers and journals, teaches 4 courses, and holds several patents.

    Know More
    Company Logo

Interact with our mentors

Learn from experts to apply security techniques that drive business resilience and advance your career.

  •  Aniket Amdekar - Mentor

    Aniket Amdekar linkin icon

    General Manager - Cyber Defence Education Great Learning
    Great Learning Logo
  •  Amin Mansouri  - Mentor

    Amin Mansouri linkin icon

    Cloud Security Architect | Security & DevOps
    Company Logo
  •  Ivan Marchany  - Mentor

    Ivan Marchany linkin icon

    Cyber Threat Engineer Raymond James
    Raymond James Logo

Course Fees

The course fee is USD 2,950

Invest in your career

  • benifits-icon

    High-quality learning content from JHU faculty.

  • benifits-icon

    Live mentored learning in micro-classes (up to 30 learners).

  • benifits-icon

    Build an impressive, industry-ready portfolio with hands-on projects.

  • benifits-icon

    Get personalized assistance with a dedicated Program Manager.

project icon

Easy payment plans

Avail our EMI options & get financial assistance

  • INSTALLMENT PLANS

    Upto 12 months Installment plans

    Explore our flexible payment plans

    View Plans

  • discount available

    Upfront Discount: USD 2,950 USD 2,750

    Referral Discount: USD 2,950 USD 2,800

Third Party Credit Facilitators

Check out different payment options with third party credit facility providers

affirm splitit

*Subject to third party credit facility provider approval based on applicable regions & eligibility

Take the next step

timer
00 : 00 : 00

Apply to the program now or schedule a call with a program advisor

Unlock exclusive course sneak peek

Application Closes: 12th Feb 2026

Application Closes: 12th Feb 2026

Talk to our advisor for offers & course details

Admission process

Admissions close once the required number of participants enroll. Apply early to secure your spot

  • steps icon

    APPLY

    Fill out an online application form.

  • steps icon

    REVIEW

    Your application will be reviewed by a panel from Great Learning to determine if it is a fit with the program

  • steps icon

    JOIN PROGRAM

    After a final review, you will receive an offer for a seat in the upcoming cohort of the program.

Course Eligibility

  • Basic computer and internet knowledge is recommended.

Batch start date

  • Online · March 2026

    Admission closing soon

Delivered in Collaboration with:

Johns Hopkins University is collaborating with online education provider Great Learning to offer the Professional Certificate in Cybersecurity: IT and Data Security in the Age of AI. Great Learning is a professional learning company with a global footprint in 14+ countries. Its mission is to make professionals around the globe proficient and future-ready. This program leverages JHU's leadership in innovation, science, engineering, and technical disciplines developed over years of research, teaching, and practice. Great Learning manages the enrollments and provides industry experts, student counselors, course support and guidance to ensure students get hands-on training and live personalized mentorship on the application of concepts taught by the JHU faculty.

Got more questions? Talk to us

Connect with our advisors and get your queries resolved

Speak with our expert +1 410 835 4326 or email to cyber.jhu@mygreatlearning.com

career guidance

Frequently asked questions

Program Details
Admissions and Eligibility
Fee and Payment
General Queries

Why should I choose the JHU Professional Certificate in Cybersecurity?

The Professional Certificate in Cybersecurity: IT and Data Security in the Age of AI offers a cutting-edge, industry-driven curriculum designed to equip you with the skills needed to address today’s cybersecurity challenges. Here’s why you should consider this program:


  • Industry-Relevant Curriculum: The program curriculum is built on the latest research and developments in AI and cybersecurity, ensuring you gain up-to-date, relevant knowledge to stay ahead of evolving threats. 
  • Hands-On Learning: Engage in real-world case studies, projects, and lab activities that provide practical experience in cybersecurity, allowing you to apply what you have learned to actual security challenges. 
  • Best-in-Class Faculty: The curriculum is designed and taught by world-renowned Johns Hopkins University faculty, who bring both academic rigor and industry experience to the program. 
  • Flexible Online Format: Delivered online, featuring comprehensive recorded video lectures, live sessions with global industry experts, and live masterclasses led by Johns Hopkins University faculty. 
  • Learning Support: Get personalized assistance from a dedicated Program Manager and academic support through the Great Learning community, project discussion forums, and peer groups. 
  • Recognition: Earn a Certificate of Completion from Johns Hopkins University, along with 11 Continuing Education Units (CEUs) and a shareable e-Portfolio. 
  • Preparation for Top Cybersecurity Certification Exams: Prepare for industry certifications such as (ISC)2 CISSP and CompTIA Security+.
  • Coverage of Federal Compliance Standards: Gain an understanding of key U.S. federal regulations and compliance frameworks relevant to data security and AI applications.

What are the learning outcomes of this program?

After completing this Cybersecurity program, you will be able to:


  • Understand foundational and core cybersecurity principles
  • Learn to implement security controls for protecting enterprise networks
  • Evaluate cloud security and develop comprehensive strategies for cloud data security.
  • Learn how AI-driven tools are used in cybersecurity through practical use cases.
  • Learn how to implement unified control programs that cover multiple compliance standards.
  • Understand how to manage compliance operations that build trust, meet evolving regulations/frameworks, and drive resilience into every layer of technology and processes.

Can I pursue this course while working full-time?

Yes, this program is designed for working professionals. Its flexible online format, structured learning journey, and dedicated program support allow you to balance learning with your job, enabling you to upskill at a steady pace without putting your career on hold.

What is the Professional Certificate in Cybersecurity program?

The Professional Certificate in Cybersecurity program is a rigorous, 14-week online program designed and delivered by world-renowned faculty from Johns Hopkins University. It combines intensive, hands-on cybersecurity training with a foundational understanding of AI, preparing you for frontline roles and industry certifications.

What is the format of this Certificate Program in Cybersecurity?

This Cybersecurity Certificate program is designed to be flexible for busy professionals with technical skills. It features hands-on labs, live mentored learning sessions, and academic support to help you master practical cybersecurity and AI skills. Delivered fully online, learners benefit from the guidance of seasoned industry experts who provide mentorship and support throughout the program.

What is the duration of this Johns Hopkins University Cybersecurity certificate program?

The program’s duration is 14 weeks.

What topics are covered in the curriculum of this Cybersecurity program?

The curriculum covers a comprehensive set of cybersecurity domains, including:


  • Foundations of Information Security: Principles of Cybersecurity, like the CIA Triad, Cryptography, Risk Management Frameworks, and evolving cyberattack techniques. 
  • Network & Infrastructure Security: Secure architecture, Zero Trust, next-generation firewalls, incident response, and vulnerability management using tools like Nessus and ACAS. 
  • Cloud and Data Security: Secure cloud design, cloud security posture monitoring, identity and access management (IDAM), cloud resilience, and data protection using encryption, masking, and anonymization. 
  • Governance, Risk, and Compliance (GRC): Key frameworks such as GDPR, PCI DSS, FedRAMP, CMMC, audit processes, and third-party risk management. 
  • AI-Powered Cyber Defense: Fundamentals of AI and Generative AI, Agentic AI for security, LLM firewalls, OWASP Top 10 for LLMs, and responsible AI practices.

What skills does this program cover?

The skills covered in this Cybersecurity program are



  • Risk Assessment and Management
  • Network Security
  • Cloud Security
  • Managing Security Assessments
  • Federal Framework Compliance Readiness
  • Malware Analysis
  • Secure Software Development
  • Identity and Access Management (IAM)
  • Incident Response and Forensics

Does this Cybersecurity program cover U.S. federal compliance standards?

Yes. The program provides a dedicated focus on key U.S. federal regulations and compliance frameworks that are essential for cybersecurity and AI-driven environments. You will gain an understanding of standards such as FedRAMP, CMMC, and other regulatory frameworks that guide data security, risk management, and responsible AI applications across industries. This prepares you to manage compliance requirements effectively within modern enterprise security programs.

Who are the faculty for this program?

This program is led by a team of highly experienced Cybersecurity professionals and academic experts who bring a wealth of knowledge and real-world insights to your learning journey:


Thomas Byrd, JD

  • Professor – Johns Hopkins University
  • Ex-VP & Enterprise Security, Senior Cybersecurity Manager – T. Rowe Price
  • Cyber leader at the FBI and Department of Defense, he has played a key role in advancing US government cyber capabilities.

Dr. Lanier Watkins

  • Holds a PhD in Computer Science and 3 MS degrees (Biotechnology, Computer Science, and Physics)
  • Published over 60 papers and journals, teaches 4 courses, and holds several patents.

Who are the mentors for this online Cybersecurity program?

During the course of this program, you will engage with leading cybersecurity experts who will guide you in applying cybersecurity techniques to drive business resilience and advance your career in cybersecurity. Mentors for the Johns Hopkins Professional Certificate in Cybersecurity program:



  • Aniket Amdekar –General Manager, Cyber Defence Education
  • Ivan Marchany –SOAR Engineer
  • Amin Mansouri –Cloud Security Architect, Security & DevOps

*Note: This is an indicative list and is subject to change based on the availability of faculty and mentors

Which industry-relevant tools and techniques will I learn to use?

You will gain hands-on experience with a wide range of industry-relevant cybersecurity tools and techniques used across network security, cloud security, threat analysis, and compliance. These include:


Nessus – Vulnerability scanning and compliance assessment
Wireshark – Network traffic capture and analysis
CyberChef – Cryptographic operations and data transformation
Shodan – Internet-wide asset discovery and exposure analysis
ANY.RUN – Malware detonation, sandboxing, and threat behavior analysis
pfSense – Firewall configuration, perimeter defense, and VPN setup
AWS Security Hub – Cloud security monitoring and best-practice assessments
Grayhat Warfare – Public storage exposure and data discovery analysis
NotebookLM – Research synthesis and knowledge support for cybersecurity tasks
OpenAI Tools – Applying Generative AI for threat detection, analysis, and secure AI practices

What practical experience will I gain?

This is a learning-by-doing program where you will work on real-world case studies, projects, and lab activities such as


Category

Experience Areas

Description/Focus

Case Studies

Equifax Data Breach (2017)

Data protection, risk management


Scattered Spider Attacks (2022–2024)

Social engineering, cyber operations


Salt Typhoon Telecom Breaches (2024–2025)

Nation-state espionage, advanced threats


MOVEit Transfer Supply-Chain Attack (2023)

Zero-day exploits, supply-chain vulnerabilities


Cl0p Ransomware Campaigns

Ransomware operations, threat intelligence


SolarWinds Cyberattack (2020)

Supply-chain infiltration, network security


Snowflake Customer Breach (2024)

Cloud IAM failures, data exposure


Cloudflare Security Incident (2024)

DDoS defense, cloud network resilience


Massive Internet Outage due to AWS Unavailability (2025)

Cloud resilience, multi-region architecture


DeepSeek AI Platform Attack (2025)

AI system security, data exposure risks

Hands-On Projects

Cryptography with CyberChef

Encryption, hashing, and encoding techniques


Ransomware Threat Analysis

Reverse engineering, malware behavior analysis


Network Traffic Analysis with Wireshark

Packet capture, protocol inspection, threat detection


Compliance Scanning with Nessus

Vulnerability scanning, compliance auditing


Secure Storage with AWS S3

Cloud data security, IAM configurations


Risk Assessment using NIST RMF

Structured risk analysis, control selection


GenAI for Cyber Offense & Defense

AI-driven threat modeling, automated defense

Lab Activities

Password Attacks

Credential testing, password cracking techniques


Vulnerability Management using Nessus

Discovery, prioritization, and remediation tracking


Configuring a pfSense Firewall

Perimeter defense, routing, VPN setup


Deploying & Securing AWS Assets

Cloud identity, networking, monitoring, encryption


Is this course aligned with any industry certifications?

Yes, the program prepares you for top cybersecurity certifications like CISSP and CompTIA Security+. The curriculum is designed to build strong foundational knowledge and practical experience relevant to both of these globally respected credentials.

What is the role of Great Learning in this program?

Great Learning is the program partner for the Professional Certificate in Cybersecurity offered by Johns Hopkins University. As a global ed-tech company for professional and higher education, Great Learning delivers industry-relevant programs in collaboration with leading academic institutions, including Johns Hopkins University.


In this program, Great Learning:

  • Delivers the program in an online format with recorded lectures, live sessions, and masterclasses.
  • Supports learning through expert mentors and highly qualified faculty.
  • Provides personalized assistance via a dedicated Program Manager.
  • Enables academic support through the Great Learning community, discussion forums, and peer groups.
  • Manages the admissions process, including application review and learner onboarding.

What is the ranking of Johns Hopkins University’s programs?

This program is offered by Johns Hopkins University (JHU), a prestigious, top‑ranked U.S. institution.


  • #6 National University (U.S. News & World Report 2025)
  • #1 in Computer Information Technology (U.S. News & World Report 2025)
  • #13 Best Global University (U.S. News & World Report 2025)

Will I earn a certificate upon completing this program?

Yes, you will receive a prestigious Certificate of Completion from Johns Hopkins University, 11 CEUs, and a shareable e-Portfolio.

Who is this program ideal for?

  • Early to mid‑career Cybersecurity professionals aiming to upskill and move into mid‑senior roles. 
  • Mid‑ to senior‑level IT professionals and engineers looking to cross‑skill into Cybersecurity. 
  • Architects and technology consultants seeking comprehensive Cybersecurity knowledge. 
  • Technology leaders and decision‑makers are aiming to strengthen organizational Cybersecurity strategy.

What is the admission process for the Professional Certificate in Cybersecurity Program?

Admissions close once the required number of participants enroll. Apply early to secure your spot.


1. APPLY
Fill out an online application form. 


 2. REVIEW
Your application will be reviewed by a panel from Great Learning to determine if it is a fit with the program. 


3. JOIN THE PROGRAM
After a final review, you will receive an offer for a seat in the upcoming cohort of the program.

What is the total fee for the Professional Certificate in Cybersecurity program?

Please contact your Program Advisor for the fee details of this Cybersecurity program.

Where can I find more information on fees and payment plans?

For the most current fee structure and to explore payment options, connect with your Program Advisor or visit the official program website.

Are payment plans or financing options available?

Yes, you can contact your Program Advisor from Great Learning for details on available offers, payment plans, and eligibility for financial assistance.

What are CEUs, and how are they useful?

Upon successful completion of the program, you will earn 11 Continuing Education Units (CEUs) along with a certificate of completion from Johns Hopkins University. CEUs are a measure of instructional time and reflect the estimated time an average student will spend completing the mandatory components of a course. CEUs are awarded upon successfully completing all course requirements, which may include assessments, assignments, evaluations, or a final project. Earning CEUs allows professionals to demonstrate their commitment to continuous learning and skill advancement.

Which career paths and job roles will this Cybersecurity certificate program online prepare me for?

The Professional Certificate in Cybersecurity program is designed to equip professionals for advancement or transition into key Cybersecurity positions, including:


  • Cybersecurity Architect
  • Senior Cybersecurity Engineer
  • Technology Consultant (specializing in Cybersecurity)
  • IT Leader / Technology Decision-Maker focused on strengthening organizational Cybersecurity strategy
  • Mid-to-Senior Level IT Professional cross-skilling into Cybersecurity



Ideal for:


  • Early to Mid‑Career Cybersecurity Professionals aiming for mid‑senior roles
  • Professionals on a CTO track with a focus on security leadership

Where can I contact for more queries?

Contact: Email cyber.jhu@mygreatlearning.com or call +1 410 835 4326 for queries about the Professional Certificate in Cybersecurity program by Johns Hopkins University.