Learn more about the course
Get details on syllabus, projects, tools, and more
Professional Certificate in Cybersecurity
Learn from World-Renowned JHU Faculty
Application closes 18th Dec 2025
PROGRAM OUTCOMES
Level up your career with actionable cybersecurity skills
-
Understand foundational and core cybersecurity principles
-
Learn to implement security controls for protecting enterprise networks
-
Evaluate cloud security and develop comprehensive strategies for cloud data security
-
Learn how AI-driven tools are used in cybersecurity through practical use cases
-
Learn how to implement unified control programs that cover multiple compliance standards
-
Understand how to manage compliance operations that build trust, meet evolving regulations/frameworks, and drive resilience into every layer of technology and processes
Earn a certificate from Johns Hopkins University
KEY PROGRAM HIGHLIGHTS
Why choose the Professional Certificate in Cybersecurity
-
Industry-focussed curriculum
Master network and infrastructure security, cloud security posture improvement, learn about AI solutions for cybersecurity and more.
-
Prepare for top certification exams
Prepare for certifications like (ISC)² CISSP and CompTIA Security+. The program provides a robust knowledge base and practical grounding to help you prepare for these globally respected credentials.
-
Flexible learning format
Learn through recorded lectures, monthly live masterclasses by JHU faculty, interactive mentored sessions, and AI-powered learning tools.
-
Hands-on learning through case studies, projects and lab activities
Work on real-world case studies, projects, and hands-on lab activities to build practical cybersecurity skills that employers look for.
-
Get expert mentorship
Gain insights from industry practitioners in cybersecurity, refine your projects and set yourself up for success in the field.
-
Personalized program support
Receive 1:1 guidance from a dedicated Program Manager and academic support from cybersecurity experts.
Skills you will learn
RISK ASSESSMENT AND MANAGEMENT
NETWORK SECURITY
CLOUD SECURITY
MALWARE ANALYSIS
SECURE SOFTWARE DEVELOPMENT
IDENTITY AND ACCESS MANAGEMENT (IAM)
INCIDENT RESPONSE AND FORENSICS
MANAGING SECURITY ASSESSMENTS
FEDERAL FRAMEWORK COMPLIANCE READINESS
RISK ASSESSMENT AND MANAGEMENT
NETWORK SECURITY
CLOUD SECURITY
MALWARE ANALYSIS
SECURE SOFTWARE DEVELOPMENT
IDENTITY AND ACCESS MANAGEMENT (IAM)
INCIDENT RESPONSE AND FORENSICS
MANAGING SECURITY ASSESSMENTS
FEDERAL FRAMEWORK COMPLIANCE READINESS
view more
- Overview
- Curriculum
- Certificate
- Tools
- Faculty
- Mentors
- Fees
This program is ideal for
Professionals looking to advance their careers with cybersecurity skills
-
Mid to senior-level IT professionals & engineers
Ideal for those seeking to upskill or cross-skill in cybersecurity. It prepares professionals for roles such as cybersecurity architects, senior engineers, or those on a CTO track.
-
Early to mid-career cybersecurity professionals
Designed for early to mid-career cybersecurity professionals who want to upskill, stay ahead of evolving threats, and transition into mid-senior cybersecurity roles.
-
Technology leaders and decision-makers
Including CISOs, who aim to strengthen cybersecurity and AI-power teams for smarter threat detection, risk management, and automation.
-
Architects & technology consultants
Suited for professionals with strong technical backgrounds seeking comprehensive cybersecurity expertise in their domain.
Experience a unique learning journey
Our pedagogy is designed to ensure career growth and transformation
-
Learn with self-paced videos
Learn critical concepts from video lectures by faculty & cybersecurity experts
-
Engage with your mentors
Clarify your doubts and gain practical skills during the weekend mentorship sessions
-
Work on hands-on projects
Work on projects to apply the concepts & tools learnt in the module
-
Get personalized assistance
Our dedicated program managers will support you whenever you need
Syllabus designed for professionals
Learn from world-renowned faculty at Johns Hopkins University, who have designed and will deliver the curriculum for this online cybersecurity course.
Note: This online cybersecurity program is thoughtfully structured to align with industry-recognized certifications such as CompTIA Security+ and (ISC)² CISSP. Learners are equipped with a solid foundation in cybersecurity principles, risk management, and cloud and data security core domains, reflected in both certifications. While not a substitute for official certification training, this program helps you effectively prepare for and build the competencies needed to pursue these globally respected exams with confidence.
PRE-WORK: PREPARATORY MODULE
The outcome of this module is to get set up with all the tools you need for the learning journey and build a solid foundation in three essential domains: operating systems, applications & APIs, and cloud computing.
- Pre-work 1: Getting Set Up for the Learning Journey
- Pre-work 2: Operating Systems
- Pre-work 3: Application Basics and API
- Pre-work 4: Foundations of AI and Cloud
MODULE 01: FOUNDATIONS OF INFORMATION SECURITY
In this module, learners will explore the foundational principles of cybersecurity, including key frameworks, types of risks and how to manage them, and core protection mechanisms for the enterprise infrastructure. They will understand how cryptography, authentication, and security standards safeguard data while gaining insight into the evolving threat landscape and common cyberattacks that shape modern defense strategies.
Sample Project: Practicing Cryptography with CyberChef
Sample Project: Ransomware Threat Analysis Using Reverse Engineering
Sample Lab Activity: Attacking Passwords With Various Tools
WEEK 1: CORE CYBERSECURITY PRINCIPLES
In this week, learners will explore the foundational principles of cybersecurity, including the CIA Triad, non-repudiation, privacy, and the principle of least privilege. They will understand how layered defense strategies (defense in depth) and the IAAA model ensure secure access and accountability. The week also introduces cryptography and authentication mechanisms, covering encryption fundamentals, digital signatures, certificates, and modern authentication techniques.
Sample Case Study: Data Protection & Risk Management
Topics Covered:
- CIA Triad (Confidentiality, Integrity, Availability)
- Identity, Authentication, Authorization & Accountability (IAAA)
- Non-Repudiation and Privacy Principles
- Principle of Least Privilege
- Defense in Depth
- Basics of Cryptography
- Post-Quantum Cryptography
- Digital Signatures and Certificates
- Authentication Techniques
WEEK 2: RISK MANAGEMENT FRAMEWORKS
Sample Case Study: Nation-State Espionage
Topics Covered:
- NIST Cybersecurity Framework 2.0
- Risk Management Framework (RMF)
- Introduction to CMMC Compliance
- Risk Identification, Assessment, and Mitigation
- Risk Responses
- Unified Control Programs
- Continuous Monitoring and Improvement
- Security Baseline
WEEK 3: CYBER ATTACKS AND THREAT LANDSCAPE
In this week, learners will examine the evolving cybersecurity threat landscape through real-world adversarial tactics and frameworks such as MITRE ATT&CK. They will analyze diverse threat actors, including nation-state groups, organized cybercrime, and AI-powered attacks, alongside risks arising from supply chains and third-party dependencies. The week also provides an in-depth understanding of major cyberattack types: social engineering, network-based, endpoint, malware, ransomware, and data breach attacks, enabling learners to recognize, assess, and respond to modern threat scenarios effectively.
- Sample Case Study: Cyber Threat Operations & Social Engineering
- MITRE ATT&CK Framework
- Nation-State Sponsored Adversaries
- Organized Cybercrime
- AI-Powered Threats
- Supply Chain Threats
- Third-Party Risks
- Social Engineering Attacks
- Network-Based Attacks
- Attacks on Endpoints
- AI-Generated Malware Attacks & Malware Analysis
- Ransomware Attacks
- Data Breaches and Manipulation
WEEK 4: LEARNING BREAK
MODULE 02: NETWORK & INFRASTRUCTURE SECURITY
In this module, learners will explore secure network design using Zero Trust and next-generation firewalls, supported by a refresher on network basics and incident response. They will gain hands-on skills in vulnerability management with tools like Nessus and ACAS, assess risks, apply patch management practices, and ensure compliance using SRGs and STIGs.
- Sample Project: Analyzing Network Traffic with Wireshark
- Sample Lab Activity: Vulnerability Management Using Nessus
- Sample Project: Assessing Risks Identified During the Pentest
- Sample Lab Activity: Configuring a pfSense Firewall
WEEK 5: SECURITY ARCHITECTURE
In this week, learners will refresh core computer networking concepts and explore modern security models like Zero Trust Network Architecture. They will understand the role of next-generation firewalls in perimeter defense and gain an introduction to incident response processes. The week also highlights how AI enhances incident analysis and response for faster, smarter threat mitigation
- Sample Case Study: Supply-Chain & Application Security
- Sample Case Study: Ransomware & Cybercrime Intelligence
Topics Covered
- Refreshing Computer Network Basics
- Zero Trust Network Architecture
- Next-Generation Firewalls
- Virtual Private Network
- Introduction to Incident Response
- Using AI for Incident Analysis & Response
WEEK 6: VULNERABILITY MANAGEMENT
- Sample Case Study: Supply-Chain & Network Security
- Vulnerability Management (Nessus)
- Detecting Shadow AI with Nessus
- ACAS (Assured Compliance Assessment Solution)
- Performing IT and Cybersecurity Vulnerability-Level Risk Assessments
- Patch Management
- Security Requirements Guides (SRGs)
- Security Technical Implementation Guides (STIGs)
MODULE 03: CLOUD AND DATA SECURITY
In this module, learners will gain a solid understanding of secure cloud design, including core architecture principles, identity management, and best practices for data protection. They will explore cloud security posture, resilience strategies, and modern approaches to automated, compliant cloud deployments, equipping them to build and secure scalable cloud environments across public and government cloud platforms.
WEEK 7: CLOUD FUNDAMENTALS & SECURE CLOUD DESIGN
In this week, learners will explore the foundations of cloud computing and understand how secure cloud architectures are built. They will examine native cloud security services, identity and access management (IDAM), and the best practices defined by the Cloud Security Alliance to ensure robust and compliant cloud environments.
- Sample Case Study: Cloud Infrastructure & DDoS Protection
- Cloud Computing Definitions
- Secure Cloud Architecture
- Cloud Native Security Services
- Cloud Security Alliance
- IDAM in Cloud
WEEK 8: CLOUD POSTURE AND SECURITY
In this week, learners will focus on maintaining strong cloud security through continuous posture monitoring and resilience planning, supported by a case study on an AWS outage. They will explore best practices in AWS security, government cloud environments, and key security controls. The week also introduces Infrastructure as Code (IaC) for automating secure and repeatable cloud deployments.
- Sample Case Study: Cloud Resilience & Incident Response
- Cloud Security Posture Monitoring
- Resilience in Cloud (Case Study: Massive Internet Outage Because of AWS Unavailability)
- AWS GovCloud (US) and Azure Government Cloud
- Cloud Security Best Practices (AWS)
- Cloud Security Controls
- Infrastructure as Code (IaC) for Secure, Repeatable Cloud Deployments
WEEK 9: CLOUD DATA SECURITY
In this week, learners will explore how to classify and secure cloud data across various storage types using techniques like encryption, masking, and anonymization. They will also examine AI-powered data classification and the role of confidential computing in protecting data while it is being processed.
- Sample Case Study: Cloud Security & Data Protection
- Data Classification and Securing Specific Storage Types
- Data Protection Mechanisms on Cloud (Encryption, Masking, and Anonymization)
- AI-Powered Data Classification
- Confidential Computing (Protection for Data In-Use)
WEEK 10: LEARNING BREAK
MODULE 04: GOVERNANCE, RISK, AND COMPLIANCE (GRC)
In this module, learners will gain a foundational understanding of governance in cybersecurity, focusing on key compliance standards and their role in risk reduction. They will also learn the essentials of audit management to ensure accountability, control effectiveness, and regulatory alignment within organizations.
- Sample Project: Perform a Compliance Scan with Nessus
- Sample Project: Conduct a Risk Assessment according to NIST RMF
WEEK 11: FUNDAMENTALS OF GRC
In this week, learners will dive into key GRC frameworks and principles that shape organizational security. They will explore major policies and privacy regulations, including GDPR, PCI DSS, FedRAMP, and CMMC Levels 1 and 2, gaining practical insights into data protection and compliance.
- Sample Case Study: Governance, Risk & Compliance (GRC)
Topics Covered:
- GRC Frameworks and Principles
- Policy and Privacy, Regulation, and Data Governance
- GDPR
- PCI/DSS
- FedRAMP
- CMMC Compliance (Level 1 & Level 2)
WEEK 12: AUDIT MANAGEMENT
In this week, learners will understand the audit lifecycle and its role in maintaining cybersecurity compliance. They will explore internal and external audit practices, learn how certification audits are conducted, and examine key governance activities, including third-party risk management, to ensure accountability across the supply chain.
Topics Covered:
- Understanding Audit Process
- Role of Internal and External Audits in Compliance
- Conducting an Internal Audit
- Certification Audits
- Governance Activities
- Third-Party Risk Management
MODULE 05: AI-POWERED CYBER DEFENCE
- Sample Project: Using GenAI for Cyber Offense and Defense
WEEK 13: FUNDAMENTALS OF AI AND GENERATIVE AI
- Sample Case Study: AI Platform Security
- Introduction to Artificial Intelligence
- Introduction to LLM
- GenAI Use Cases for Cybersecurity
- OWASP Top 10 for LLM
- AI Governance
WEEK 14: APPLICATIONS OF AI IN CYBERSECURITY
In this week, learners will explore how AI is applied to real-world cybersecurity challenges, including threat detection and automated defense. They will examine agentic AI tools such as Darktrace, understand the role of LLM firewalls in securing AI systems, and learn responsible AI practices to mitigate bias and hallucination risks.
Topics Covered:
- Applied AI in Cybersecurity
- Agentic AI for Security (Darktrace)
- LLM Firewall
- Responsible AI Practices: Bias & Hallucination
Master in-demand cybersecurity tools
Tools and techniques you will learn in this cybersecurity course
Earn a professional cybersecurity certificate from Johns Hopkins University
Get a certificate of completion from Johns Hopkins University (with 11 Continuing Education Units - CEUs)
-
Tech Leadership
#1 Computer Information Technology by U.S. News & World Report
-
National Recognition
#6 National University by U.S. News & World Report
-
Global Standing
#13 Best Global University by U.S. News & World Report
* Image for illustration only. Certificate subject to change.
Meet your faculty
Learn from world-renowned JHU faculty
Interact with our mentors
Engage with leading cybersecurity experts who will guide you in applying cybersecurity techniques to drive business resilience and advance your career in cybersecurity.
Program fee
The course fee is 2,950 USD
Invest in your career
-
High-quality learning content from JHU faculty.
-
Live mentored learning in micro-classes (up to 30 learners).
-
Build an impressive, industry-ready portfolio with hands-on projects.
-
Get personalized assistance with a dedicated Program Manager.
-
INSTALLMENT PLANS
Upto 12 months Installment plans
Explore our flexible payment plans
View Plans
-
discount available
2,950 USD 2,750 USD
2,950 USD 2,800 USD
Third Party Credit Facilitators
Check out different payment options with third party credit facility providers
*Subject to third party credit facility provider approval based on applicable regions & eligibility
Admission process
Admissions close once the required number of participants enroll. Apply early to secure your spot
-
1. APPLY
Fill out an online application form.
-
2. REVIEW
Your application will be reviewed by a panel from Great Learning to determine if it is a fit with the program
-
3. JOIN PROGRAM
After a final review, you will receive an offer for a seat in the upcoming cohort of the program.
Batch start date
-
Online · To be announced
Admissions Open
Delivered in Collaboration with:
Johns Hopkins University is collaborating with online education provider Great Learning to offer the Professional Certificate in Cybersecurity: IT and Data Security in the Age of AI. Great Learning is a professional learning company with a global footprint in 14+ countries. Its mission is to make professionals around the globe proficient and future-ready. This program leverages JHU's leadership in innovation, science, engineering, and technical disciplines developed over years of research, teaching, and practice. Great Learning manages the enrollments and provides industry experts, student counselors, course support and guidance to ensure students get hands-on training and live personalized mentorship on the application of concepts taught by the JHU faculty.
Batch Profile
The PGP-Artificial Intelligence and Machine Learning class represents a diverse mix of work experience, industries, and geographies - guaranteeing a truly global and eclectic learning experience.
The PGP-Artificial Intelligence and Machine Learning class comes from some of the leading organizations.