Overview
In this program, you will learn how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals.
Syllabus
- Welcome to the Nanodegree Program
- Cybersecurity Foundations
- Security is embedded in all we do online and is a critical job skill and career field. This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.
- Defending and Securing Systems
- In this course, students will be exposed to a diverse group of technologies that will provide or enhance the
skills needed to enter the cybersecurity field. Students will apply best practices of Defense in Depth to secure
computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. Students will also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit. - Threats, Vulnerabilities, and Incident Response
- Cybersecurity breaches happen when a threat is able to successfully exploit a vulnerability within a business. To avoid these attacks, security professionals must understand the threats the company is facing, including the various threat actors and their motivations. Security professionals must also be able to find vulnerabilities that can enable threats to attack through common practices such as vulnerability scanning and penetration testing. Finally, security professionals should be able to activate and follow incident response procedures to address cybersecurity incidents and breaches. Ultimately, during this course, students will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks.
- Governance, Risk, and Compliance
- This course provides an overview of governance, risk, and compliance. It focuses on the importance of GRC, identifying GRC concerns, and ways to mitigate those concerns.
- Congratulations!
- Congratulations on finishing your program!
Taught by
Ron Woerner, CISSP, CISM, Jerry Smith, Christine Izuakor, PhD, CISSP and Sean Pike, Esq., M.S.
Reviews
5.0 rating, based on 5 Class Central reviews
4.5 rating at Udacity based on 129 ratings
Showing Class Central Sort
-
The program is going really awesome, the concepts are clearly explained and had been a lot of reading shared so it complement really well all the things learned. It is matching perfectly my expectations so far, and the best thing is the way to learn, that I can join after work any time I want.
-
So far, the program is going as planned. I am doing my part to make sure I graduate and finish within the required time.
-
As a student who is new to both IT and Cybersecurity, the content thus far has been far more challenging than I had thought. However, the teaching style and projects provide a great platform for learning and this has benefitted me greatly. I am lear…
-
Thank you in advance for all your efforts. until now the program extended my knowledge about the basic things in cybersecurity, also increased the awareness about how can I protect myself and my community from any harmful things that may happen online.
-
This is the first program I took from curiosity. I think the teaching is good but the project makes it great. Udacity teaching style is very down to earth - easy to follow, to the point. I have zero knowledge in the subject but I feel I have learnt a lot.