Udacity Security Engineer Nanodegree

Udacity Security Engineer Nanodegree

Udacity Security Engineer Nanodegree

Gain the highly sought-after skills to protect an organization’s computer networks and systems from security threats or attacks.

FTC Disclosure

devLatino may receive compensation from the companies whose courses and products we showcase, with no added cost to you. We only partner with the very best and most reputable companies. devLatino is independently owned, and the opinions expressed here are our own

Udacity Security Engineer Nanodegree Overview

In the Udacity Security Engineer Nanodegree program, you’ll master the foundational skills necessary to become a successful Security Engineer. This program will focus on how to protect a company’s computer systems, networks, applications, and infrastructure from security threats or attacks.

Cybersecurity professionals earn approximately $135,000 per year, on average.

Prerequisites

In order to be successful in this Nanodegree program, you should have the following skillset:

  • Basics of Python, experience configuring AWS and Linux environments
  • Understand basic operating system fundamentals
  • Understand basic principles of networking
  • Follow, interpret and implement minor modifications to Python code
  • Set up an AWS environment and perform cloud configuration/management
  • Set up a Linux environment and perform system configuration/management

Udacity Security Engineer Courses:

Security Engineering Fundamentals

This course introduces the fundamental concepts and practices of security engineering. These are the basic principles and properties a security engineer will apply when evaluating, prioritizing and communicating security topics. Additionally, you’ll learn about the practical applications of cryptography. You will also learn about strategies for risk evaluation, security review, and audit.

System Security

In this course, you’ll start by exploring the basics of system security and its implementation at the operating system level. You will learn about implementing authentication and authorization as a means to protect access to data and services. You will also learn about detecting unauthorized changes to a system and how to effectively counter them. By the end, you will understand how to build logging, monitoring and auditing tools that can alert you to system security breaches and how to effectively counter them in a real-world case.

Infrastructure Security

In this course, you will be introduced to the industry best practices for security configurations and controls. You will perform an assessment that includes security benchmarks, configurations, and controls. You will also scan the main infrastructure operating systems for vulnerabilities and produce a report based on an industry scenario. At the end of this course, you will be familiar with industry terminology and security best practices. You will also learn to perform vulnerability scans and produce industry-standard reports.

Application Security

In this course, you will learn the basics of secure web application. You will start by learning about OWASP and the Top 10 list of vulnerabilities within web applications. You will also learn how to do Static code scans using special software and even how to manually test a web application. By the end of this course, you will be able to work as a security expert that can help shape the security posture of the development team to help build more secure web applications.

 

Scroll to Top