Udacity Intro to Cybersecurity Nanodegree

udacity intro to cybersecurity

Udacity Intro to Cybersecurity Nanodegree

Get your start in the high-growth field of Cybersecurity by building foundational skills in how to evaluate, maintain, and monitor the security of computer systems.

FTC Disclosure

devLatino may receive compensation from the companies whose courses and products we showcase, with no added cost to you. We only partner with the very best and most reputable companies. devLatino is independently owned, and the opinions expressed here are our own

Introduction to Cybersecurity

Take your first step toward a career in cybersecurity and learn the skills required to become a security professional with the Introduction to Cybersecurity Nanodegree program. In this program, you will learn how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals.

Prerequisites:

To be best prepared to succeed in this Cybersecurity course, students should have basic familiarity or experience with:

  • Basic knowledge of network connectivity and OS fundamentals.
  • Principles of network connectivity.
  • Basic operating system fundamentals including Windows or Linux.

Intro to Cybersecurity Classes:

Cybersecurity Foundations

This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.

Defending and Securing Systems

Gain exposure to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. You will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. You'll also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.

Threats, Vulnerabilities, and Incident Response

During this course, you will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks. You'll be able to explain the relationship between threats, threat actors, vulnerabilities, and exploits, leverage the MITRE ATT&CK framework to understand attack methods, and distinguish events from incidents and recognize indicators of compromise.

Governance, Risk, and Compliance

Cybersecurity Governance, Risk, and Compliance (GRC) has rapidly become a critical part of an effective cybersecurity strategy. In this course, students will learn about the functions of Governance, Risk, and Compliance and how each function operates alongside operational controls to strengthen an organization’s security. Students will also learn how to assess control effectiveness, measure security risk, and ensure that organizations are meeting security compliance objectives.

How long to complete this Nanodegree?

According to Udacity, the average, successful student takes about 4 months to complete this program.

Scroll to Top