phone iconSpeak with our expert +1 410 835 4326

Learn more about the course

Get details on syllabus, projects, tools, and more

Name
Email
Mobile Number

By submitting this form, you consent to our Terms of Use & Privacy Policy and to be contacted by us via Email/Call/Whatsapp/SMS.

Professional Certificate in Cybersecurity

Professional Certificate in Cybersecurity

Learn from World-Renowned JHU Faculty

Application closes 18th Dec 2025

overview icon

PROGRAM OUTCOMES

Level up your career with actionable cybersecurity skills

  • List icon

    Understand foundational and core cybersecurity principles

  • List icon

    Learn to implement security controls for protecting enterprise networks

  • List icon

    Evaluate cloud security and develop comprehensive strategies for cloud data security

  • List icon

    Learn how AI-driven tools are used in cybersecurity through practical use cases

  • List icon

    Learn how to implement unified control programs that cover multiple compliance standards

  • List icon

    Understand how to manage compliance operations that build trust, meet evolving regulations/frameworks, and drive resilience into every layer of technology and processes

Earn a certificate from Johns Hopkins University

  • ranking 6

    #6 National University Rankings

    U.S. News & World Report, 2025

  • ranking 1

    #1 Computer Information Technology

    U.S. News & World Report

  • ranking 13

    #13 Best Global University

    U.S. News & World Report, 2024

KEY PROGRAM HIGHLIGHTS

Why choose the Professional Certificate in Cybersecurity

  • List icon

    Industry-focussed curriculum

    Master network and infrastructure security, cloud security posture improvement, learn about AI solutions for cybersecurity and more.

  • List icon

    Prepare for top certification exams

    Prepare for certifications like (ISC)² CISSP and CompTIA Security+. The program provides a robust knowledge base and practical grounding to help you prepare for these globally respected credentials.

  • List icon

    Flexible learning format

    Learn through recorded lectures, monthly live masterclasses by JHU faculty, interactive mentored sessions, and AI-powered learning tools.

  • List icon

    Hands-on learning through case studies, projects and lab activities

    Work on real-world case studies, projects, and hands-on lab activities to build practical cybersecurity skills that employers look for.

  • List icon

    Get expert mentorship

    Gain insights from industry practitioners in cybersecurity, refine your projects and set yourself up for success in the field.

  • List icon

    Personalized program support

    Receive 1:1 guidance from a dedicated Program Manager and academic support from cybersecurity experts.

Skills you will learn

RISK ASSESSMENT AND MANAGEMENT

NETWORK SECURITY

CLOUD SECURITY

MALWARE ANALYSIS

SECURE SOFTWARE DEVELOPMENT

IDENTITY AND ACCESS MANAGEMENT (IAM)

INCIDENT RESPONSE AND FORENSICS

MANAGING SECURITY ASSESSMENTS

FEDERAL FRAMEWORK COMPLIANCE READINESS

RISK ASSESSMENT AND MANAGEMENT

NETWORK SECURITY

CLOUD SECURITY

MALWARE ANALYSIS

SECURE SOFTWARE DEVELOPMENT

IDENTITY AND ACCESS MANAGEMENT (IAM)

INCIDENT RESPONSE AND FORENSICS

MANAGING SECURITY ASSESSMENTS

FEDERAL FRAMEWORK COMPLIANCE READINESS

view more

  • Overview
  • Curriculum
  • Certificate
  • Tools
  • Faculty
  • Mentors
  • Fees
optimal icon

This program is ideal for

Professionals looking to advance their careers with cybersecurity skills

  • Mid to senior-level IT professionals & engineers

    Ideal for those seeking to upskill or cross-skill in cybersecurity. It prepares professionals for roles such as cybersecurity architects, senior engineers, or those on a CTO track.

  • Early to mid-career cybersecurity professionals

    Designed for early to mid-career cybersecurity professionals who want to upskill, stay ahead of evolving threats, and transition into mid-senior cybersecurity roles.

  • Technology leaders and decision-makers

    Including CISOs, who aim to strengthen cybersecurity and AI-power teams for smarter threat detection, risk management, and automation.

  • Architects & technology consultants

    Suited for professionals with strong technical backgrounds seeking comprehensive cybersecurity expertise in their domain.

Experience a unique learning journey

Our pedagogy is designed to ensure career growth and transformation

  • banner-image

    Learn with self-paced videos

    Learn critical concepts from video lectures by faculty & cybersecurity experts

  • banner-image

    Engage with your mentors

    Clarify your doubts and gain practical skills during the weekend mentorship sessions

  • banner-image

    Work on hands-on projects

    Work on projects to apply the concepts & tools learnt in the module 

  • banner-image

    Get personalized assistance

    Our dedicated program managers will support you whenever you need

Syllabus designed for professionals

Learn from world-renowned faculty at Johns Hopkins University, who have designed and will deliver the curriculum for this online cybersecurity course.

Note: This online cybersecurity program is thoughtfully structured to align with industry-recognized certifications such as CompTIA Security+ and (ISC)² CISSP. Learners are equipped with a solid foundation in cybersecurity principles, risk management, and cloud and data security core domains, reflected in both certifications. While not a substitute for official certification training, this program helps you effectively prepare for and build the competencies needed to pursue these globally respected exams with confidence.

PRE-WORK: PREPARATORY MODULE

The outcome of this module is to get set up with all the tools you need for the learning journey and build a solid foundation in three essential domains: operating systems, applications & APIs, and cloud computing. 

  • Pre-work 1: Getting Set Up for the Learning Journey 
  • Pre-work 2: Operating Systems 
  • Pre-work 3: Application Basics and API 
  • Pre-work 4: Foundations of AI and Cloud

MODULE 01: FOUNDATIONS OF INFORMATION SECURITY

In this module, learners will explore the foundational principles of cybersecurity, including key frameworks, types of risks and how to manage them, and core protection mechanisms for the enterprise infrastructure. They will understand how cryptography, authentication, and security standards safeguard data while gaining insight into the evolving threat landscape and common cyberattacks that shape modern defense strategies. 

 Sample Project: Practicing Cryptography with CyberChef 

Sample Project: Ransomware Threat Analysis Using Reverse Engineering 

Sample Lab Activity: Attacking Passwords With Various Tools

WEEK 1: CORE CYBERSECURITY PRINCIPLES

In this week, learners will explore the foundational principles of cybersecurity, including the CIA Triad, non-repudiation, privacy, and the principle of least privilege. They will understand how layered defense strategies (defense in depth) and the IAAA model ensure secure access and accountability. The week also introduces cryptography and authentication mechanisms, covering encryption fundamentals, digital signatures, certificates, and modern authentication techniques.

Sample Case Study: Data Protection & Risk Management

Topics Covered:

  • CIA Triad (Confidentiality, Integrity, Availability) 
  • Identity, Authentication, Authorization & Accountability (IAAA) 
  • Non-Repudiation and Privacy Principles 
  • Principle of Least Privilege 
  • Defense in Depth 
  • Basics of Cryptography 
  • Post-Quantum Cryptography 
  • Digital Signatures and Certificates 
  • Authentication Techniques

WEEK 2: RISK MANAGEMENT FRAMEWORKS

In this week, learners will be introduced to a skill that is essential for every cybersecurity professional: risk management. Learners will explore different strategies for managing risks, such as risk identification, assessment, mitigation, and response strategies. They will learn to establish unified control programs, maintain security baselines, and implement continuous security monitoring for ongoing improvement. The week also introduces learners to the most significant frameworks used by the entire cybersecurity industry, including the NIST Cybersecurity Framework 2.0, the Risk Management Framework (RMF), and CMMC compliance, to ensure structured and resilient security governance.

Sample Case Study: Nation-State Espionage

Topics Covered:

  • NIST Cybersecurity Framework 2.0 
  • Risk Management Framework (RMF) 
  • Introduction to CMMC Compliance 
  • Risk Identification, Assessment, and Mitigation 
  • Risk Responses 
  • Unified Control Programs 
  • Continuous Monitoring and Improvement 
  • Security Baseline


WEEK 3: CYBER ATTACKS AND THREAT LANDSCAPE

In this week, learners will examine the evolving cybersecurity threat landscape through real-world adversarial tactics and frameworks such as MITRE ATT&CK. They will analyze diverse threat actors, including nation-state groups, organized cybercrime, and AI-powered attacks, alongside risks arising from supply chains and third-party dependencies. The week also provides an in-depth understanding of major cyberattack types: social engineering, network-based, endpoint, malware, ransomware, and data breach attacks, enabling learners to recognize, assess, and respond to modern threat scenarios effectively.

  • Sample Case Study: Cyber Threat Operations & Social Engineering
Topics Covered:

  • MITRE ATT&CK Framework 
  • Nation-State Sponsored Adversaries 
  • Organized Cybercrime 
  • AI-Powered Threats 
  • Supply Chain Threats 
  • Third-Party Risks 
  • Social Engineering Attacks 
  • Network-Based Attacks 
  • Attacks on Endpoints 
  • AI-Generated Malware Attacks & Malware Analysis 
  • Ransomware Attacks 
  • Data Breaches and Manipulation


WEEK 4: LEARNING BREAK

MODULE 02: NETWORK & INFRASTRUCTURE SECURITY

In this module, learners will explore secure network design using Zero Trust and next-generation firewalls, supported by a refresher on network basics and incident response. They will gain hands-on skills in vulnerability management with tools like Nessus and ACAS, assess risks, apply patch management practices, and ensure compliance using SRGs and STIGs.

  • Sample Project: Analyzing Network Traffic with Wireshark 
  • Sample Lab Activity: Vulnerability Management Using Nessus 
  • Sample Project: Assessing Risks Identified During the Pentest 
  • Sample Lab Activity: Configuring a pfSense Firewall

WEEK 5: SECURITY ARCHITECTURE

In this week, learners will refresh core computer networking concepts and explore modern security models like Zero Trust Network Architecture. They will understand the role of next-generation firewalls in perimeter defense and gain an introduction to incident response processes. The week also highlights how AI enhances incident analysis and response for faster, smarter threat mitigation

  • Sample Case Study: Supply-Chain & Application Security 
  • Sample Case Study: Ransomware & Cybercrime Intelligence

Topics Covered 

  • Refreshing Computer Network Basics 
  • Zero Trust Network Architecture 
  • Next-Generation Firewalls 
  • Virtual Private Network 
  • Introduction to Incident Response 
  • Using AI for Incident Analysis & Response

WEEK 6: VULNERABILITY MANAGEMENT

In this week, learners will develop practical skills in vulnerability management using tools such as Nessus to identify and assess security weaknesses. They will perform IT and cybersecurity vulnerability-level risk assessments and apply effective patch management strategies. Government organizations adhere to Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs) to ensure strict compliance, secure configurations, and alignment with the Department of Defense’s cybersecurity standards. Learners will also understand the process involved in SRGs and STIGs, reinforcing system security and organizational resilience.

  • Sample Case Study: Supply-Chain & Network Security

Topics Covered:

  • Vulnerability Management (Nessus) 
  • Detecting Shadow AI with Nessus 
  • ACAS (Assured Compliance Assessment Solution) 
  • Performing IT and Cybersecurity Vulnerability-Level Risk Assessments 
  • Patch Management 
  • Security Requirements Guides (SRGs) 
  • Security Technical Implementation Guides (STIGs) 

MODULE 03: CLOUD AND DATA SECURITY

In this module, learners will gain a solid understanding of secure cloud design, including core architecture principles, identity management, and best practices for data protection. They will explore cloud security posture, resilience strategies, and modern approaches to automated, compliant cloud deployments, equipping them to build and secure scalable cloud environments across public and government cloud platforms.

  • Sample Lab Activity: Deploying and Securing Assets in AWS
  • Sample Project: Using S3 Buckets for Secure Storage of Sensitive Data

WEEK 7: CLOUD FUNDAMENTALS & SECURE CLOUD DESIGN

In this week, learners will explore the foundations of cloud computing and understand how secure cloud architectures are built. They will examine native cloud security services, identity and access management (IDAM), and the best practices defined by the Cloud Security Alliance to ensure robust and compliant cloud environments.

  • Sample Case Study: Cloud Infrastructure & DDoS Protection
Topics Covered:

  • Cloud Computing Definitions 
  • Secure Cloud Architecture 
  • Cloud Native Security Services 
  • Cloud Security Alliance 
  • IDAM in Cloud

WEEK 8: CLOUD POSTURE AND SECURITY

In this week, learners will focus on maintaining strong cloud security through continuous posture monitoring and resilience planning, supported by a case study on an AWS outage. They will explore best practices in AWS security, government cloud environments, and key security controls. The week also introduces Infrastructure as Code (IaC) for automating secure and repeatable cloud deployments.

  • Sample Case Study: Cloud Resilience & Incident Response
Topics Covered 

  • Cloud Security Posture Monitoring 
  • Resilience in Cloud (Case Study: Massive Internet Outage Because of AWS Unavailability) 
  • AWS GovCloud (US) and Azure Government Cloud 
  • Cloud Security Best Practices (AWS) 
  • Cloud Security Controls 
  • Infrastructure as Code (IaC) for Secure, Repeatable Cloud Deployments

WEEK 9: CLOUD DATA SECURITY

In this week, learners will explore how to classify and secure cloud data across various storage types using techniques like encryption, masking, and anonymization. They will also examine AI-powered data classification and the role of confidential computing in protecting data while it is being processed.

  • Sample Case Study: Cloud Security & Data Protection

 Topics Covered: 

  • Data Classification and Securing Specific Storage Types 
  • Data Protection Mechanisms on Cloud (Encryption, Masking, and Anonymization) 
  • AI-Powered Data Classification 
  • Confidential Computing (Protection for Data In-Use)

WEEK 10: LEARNING BREAK

MODULE 04: GOVERNANCE, RISK, AND COMPLIANCE (GRC)

In this module, learners will gain a foundational understanding of governance in cybersecurity, focusing on key compliance standards and their role in risk reduction. They will also learn the essentials of audit management to ensure accountability, control effectiveness, and regulatory alignment within organizations.

  • Sample Project: Perform a Compliance Scan with Nessus 
  • Sample Project: Conduct a Risk Assessment according to NIST RMF

WEEK 11: FUNDAMENTALS OF GRC

In this week, learners will dive into key GRC frameworks and principles that shape organizational security. They will explore major policies and privacy regulations, including GDPR, PCI DSS, FedRAMP, and CMMC Levels 1 and 2, gaining practical insights into data protection and compliance.

  • Sample Case Study: Governance, Risk & Compliance (GRC)

Topics Covered:

  • GRC Frameworks and Principles 
  • Policy and Privacy, Regulation, and Data Governance 
  • GDPR 
  • PCI/DSS 
  • FedRAMP 
  • CMMC Compliance (Level 1 & Level 2)

WEEK 12: AUDIT MANAGEMENT

In this week, learners will understand the audit lifecycle and its role in maintaining cybersecurity compliance. They will explore internal and external audit practices, learn how certification audits are conducted, and examine key governance activities, including third-party risk management, to ensure accountability across the supply chain.

Topics Covered: 

  • Understanding Audit Process 
  • Role of Internal and External Audits in Compliance 
  • Conducting an Internal Audit 
  • Certification Audits 
  • Governance Activities 
  • Third-Party Risk Management

MODULE 05: AI-POWERED CYBER DEFENCE

In this module, learners will build a foundational understanding of artificial intelligence and explore its transformative applications in cybersecurity, including threat detection, automated defense, and secure AI system design.

  • Sample Project: Using GenAI for Cyber Offense and Defense

WEEK 13: FUNDAMENTALS OF AI AND GENERATIVE AI

In this week, learners will be introduced to the fundamentals of artificial intelligence and large language models (LLMs), with a focus on their applications in cybersecurity. They will explore real-world GenAI use cases, understand security risks through the OWASP Top 10 for LLMs, and learn about essential AI governance practices to ensure safe and ethical deployment.

  • Sample Case Study: AI Platform Security

 Topics Covered:

  • Introduction to Artificial Intelligence 
  • Introduction to LLM 
  • GenAI Use Cases for Cybersecurity 
  • OWASP Top 10 for LLM 
  • AI Governance

WEEK 14: APPLICATIONS OF AI IN CYBERSECURITY

In this week, learners will explore how AI is applied to real-world cybersecurity challenges, including threat detection and automated defense. They will examine agentic AI tools such as Darktrace, understand the role of LLM firewalls in securing AI systems, and learn responsible AI practices to mitigate bias and hallucination risks.

Topics Covered:

  • Applied AI in Cybersecurity 
  • Agentic AI for Security (Darktrace) 
  • LLM Firewall 
  • Responsible AI Practices: Bias & Hallucination

Master in-demand cybersecurity tools

Tools and techniques you will learn in this cybersecurity course

  • tools-icon

    Nessus

  • tools-icon

    Wireshark

  • tools-icon

    CyberChef

  • tools-icon

    shodan.io

  • tools-icon

    OpenAI

  • tools-icon

    App.any.run

  • tools-icon

    Kali Linux

  • tools-icon

    Pfsense

  • tools-icon

    AWS Security HUB

  • tools-icon

    NotebookLM

  • tools-icon

    Grayhat Warfare

  • And More...
  • View More

Earn a professional cybersecurity certificate from Johns Hopkins University

Get a certificate of completion from Johns Hopkins University (with 11 Continuing Education Units - CEUs)

  • Tech Leadership

    Tech Leadership

    #1 Computer Information Technology by U.S. News & World Report

  • National Recognition

    National Recognition

    #6 National University by U.S. News & World Report

  • Global Standing

    Global Standing

    #13 Best Global University by U.S. News & World Report

certificate image

* Image for illustration only. Certificate subject to change.

Meet your faculty

Learn from world-renowned JHU faculty

  • Thomas Byrd, JD.  - Faculty Director

    Thomas Byrd, JD.

    Professor – Johns Hopkins University

    Ex-VP & Enterprise Security, Senior Cybersecurity Manager – T. Rowe Price

    Cyber leader at the FBI and Department of Defense, he has played a key role in advancing US government cyber capabilities.

    Know More
    Company Logo
  • Dr. Lanier Watkins  - Faculty Director

    Dr. Lanier Watkins

    Principal Cybersecurity Research Professor - Johns Hopkins University

    Holds a PhD in Computer Science and 3 MS degrees (Biotechnology, Computer Science, and Physics)

    Published over 60 papers and journals, teaches 4 courses, and holds several patents.

    Know More
    Company Logo

Interact with our mentors

Engage with leading cybersecurity experts who will guide you in applying cybersecurity techniques to drive business resilience and advance your career in cybersecurity.

  •  Aniket Amdekar - Mentor

    Aniket Amdekar linkin icon

    General Manager - Cyber Defence Education Great Learning
    Great Learning Logo
  •  Ivan Marchany  - Mentor

    Ivan Marchany linkin icon

    Cyber Threat Engineer Raymond James
    Raymond James Logo
  •  Amin Mansouri  - Mentor

    Amin Mansouri linkin icon

    Cloud Security Architect | Security & DevOps
    Company Logo

This is an indicative list and is subject to change based on the availability of faculty and mentors

Program fee

The course fee is 2,950 USD

Invest in your career

  • benifits-icon

    High-quality learning content from JHU faculty.

  • benifits-icon

    Live mentored learning in micro-classes (up to 30 learners).

  • benifits-icon

    Build an impressive, industry-ready portfolio with hands-on projects.

  • benifits-icon

    Get personalized assistance with a dedicated Program Manager.

project icon

Easy payment plans

Avail our flexible payment options & get financial assistance

  • INSTALLMENT PLANS

    Upto 12 months Installment plans

    Explore our flexible payment plans

    View Plans

  • discount available

    Upfront discount:2,950 USD 2,750 USD

    Referral discount:2,950 USD 2,800 USD

Third Party Credit Facilitators

Check out different payment options with third party credit facility providers

benifits-icon benifits-icon

*Subject to third party credit facility provider approval based on applicable regions & eligibility

Admission process

Admissions close once the required number of participants enroll. Apply early to secure your spot

  • steps icon

    1. APPLY

    Fill out an online application form.

  • steps icon

    2. REVIEW

    Your application will be reviewed by a panel from Great Learning to determine if it is a fit with the program

  • steps icon

    3. JOIN PROGRAM

    After a final review, you will receive an offer for a seat in the upcoming cohort of the program.

Batch start date

Got more questions? Talk to us

Connect with a program advisor and get your queries resolved

Speak with our expert +1 410 835 4326 or email to cyber.jhu@mygreatlearning.com

career guidance

Delivered in Collaboration with:

Johns Hopkins University is collaborating with online education provider Great Learning to offer the Professional Certificate in Cybersecurity: IT and Data Security in the Age of AI. Great Learning is a professional learning company with a global footprint in 14+ countries. Its mission is to make professionals around the globe proficient and future-ready. This program leverages JHU's leadership in innovation, science, engineering, and technical disciplines developed over years of research, teaching, and practice. Great Learning manages the enrollments and provides industry experts, student counselors, course support and guidance to ensure students get hands-on training and live personalized mentorship on the application of concepts taught by the JHU faculty.