RITx MicroMasters Program in Cybersecurity

Practice cybersecurity with real-world scenarios.

Pursue the Program

What you will learn


Fundamentals of networks


Systems administration


How to protect computer networks and other systems by mitigating vulnerabilities and monitoring intrusions


How to perform digital forensic analysis of cybercrime by gathering information on the nature and extent of the attack for presentation in a court of law, as well as assessing the extent of the damage to an organization


Techniques of risk analysis


Risk assessment and vulnerability assessment.

Program Overview

Gain the essential knowledge and expertise in network security and forensics needed for cybersecurity in enterprise environments. The MicroMasters program capstone experience for verified learners entails practical demonstration of these skills.

Several calendar pages.

Time to completion

10 months
10-12 hours per week

Pathway to Credit 

Upon successful completion of the Cybersecurity MicroMasters program, you will be prepared to advance in the workforce, and may also build on your work by applying to RIT. Admitted students may be awarded credit for their MicroMasters program certificate toward the advanced certificate in cybersecurity and/or the master of science in computing security at RIT, resulting in an accelerated graduate degree.

Job Outlook

Jobs in cybersecurity in the US are expected to grow 29% by 2030.

34% of the jobs postings in the IT field are for information security.

Burning Glass

If you are already in the IT field, expect a 9% raise in pay for security expertise.

Forbes

Average annual salary for cybersecurity professionals was $96,000 over the last 12 months.

US Bureau of Labor Statistics

Corporate Endorsement

“The shortage of skilled and qualified cybersecurity professionals is one of the biggest issues facing our Internet-connected world today. RIT is helping to close this gap as a leader in computing security education. Professionals who gain the skills and tactics needed to defend against the next generation of security threats will be better prepared for careers at IBM and other organizations in the cybersecurity industry.”

Bob Kalka, CRISC
Vice President
IBM Security Business Unit

“Tech Mahindra is guaranteeing interviews at its India locations for edX learners who successfully complete this MicroMasters program and meet other hiring criteria. Today’s disruptive business landscape demands for our talents to be future ready and it is our prime responsibility that the right tools and innovative pathways are facilitated for them... We are excited to work together with edX because careers will be facilitated with a blended learning environment, as well as this gives us the opportunity to bring in new ideas to the table and enhance our customer’s experiences.”

CP Gumanii
CEO
Tech Mahindra

Courses

Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks.

In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.

Enroll in the Cybersecurity Fundamentals course on edX

See more details about this Cybersecurity Fundamentals course on edx.org, including pricing, prerequisites, and more.

Learn the process, techniques, and tools for performing a digital forensics investigation to obtain data related to computer crimes. 

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. 

Enroll in the Computer Forensics course on edX

See more details about this Computer Forensics course on edx.org, including pricing, prerequisites, and more.

Learn what makes global projects uniquely challenging and how to successfully manage projects based in different industries and countries.

Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies.

Enroll in the Cybersecurity Risk Management course on edX

See more details about this Cybersecurity Risk Management course on edx.org, including pricing, prerequisites, and more.

Learn the process of network security, including intrusion detection, evidence collection, network auditing, and contingency planning against attacks.

In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks.

Enroll Network Security course on edX

See more details about this Network Security course on edx.org, including pricing, prerequisites, and more.

Demonstrate the knowledge and skills acquired in the Cybersecurity MicroMasters program.  

Enroll in the Cybersecurity Capstone on edX

See more details about this Cybersecurity Capstone course on edx.org, including pricing, prerequisites, and more.

Frequently Asked Questions

The edX Help Center is an excellent resource which will likely have the answer to your question. If not, you may email info@edx.org with your question.

The Cybersecurity MicroMasters program is intended for those who have completed a STEM Bachelor’s degree or have a minimum of 5 years of work experience in a technical environment.

The Cybersecurity Capstone will test knowledge across all four Cybersecurity courses. It will feature hands-on laboratory exercises, similar to the peer or self-assessed exercises in the other Cybersecurity courses.

Having the MicroMasters program certificate provides the admissions committee with significant insight into a student’s capabilities through the completion of four online offerings and the capstone.

Yes, you must then be admitted to the master’s degree program. Successful completion of of the MicroMasters program certificate does not guarantee admission. It does allow RIT to look at a more expanded track record for each applicant. The learner will need to complete the application process to RIT and the MS Computing Security degree program in order to be considered for admission.

MicroMasters programs are a series of graduate level courses from top universities designed to advance your career. MicroMasters program certificates showcase deep learning and in-demand skills to employers and can help you get started on a path toward completing an advanced degree.

To earn the program certificate, learners must successfully earn a verified certificate in all three project management courses, and pass the final comprehensive capstone exam.

Upon successful completion of the Cybersecurity MicroMasters program, you may build on your work by applying to RIT. Admitted students may be awarded credit for their MicroMasters program certificate toward select graduate programs at RIT.

If the edX offering is self-paced, you can begin any time during the open enrollment period. If the course is instructor-paced, you may begin when the course starts. Visit the program of interest to enroll and learn more.

Enrollment into programs or offerings and payment are processed on edx.org. Visit the program of interest to enroll and learn more.

Verified learners have the ability to receive a certificate to validate their successful completion of the edX course. Verified learners also are the only learners who will have the ability to participate in graded assessments.

During an active self-paced offering, all of the course content will be available to the learner upon enrollment. You can complete the course on your own schedule within the designated course start and end dates without any other date restrictions.

Instructor-paced offerings begin at a set date and content is released to all learners on a weekly basis. These offerings may include weekly deadlines for assignments or quizzes.

Unfortunately, learners from one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. EdX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.