www.udacity.com
Open in
urlscan Pro
2606:4700::6812:a74
Public Scan
Submitted URL: https://imp.i115008.net/Ry1X7X
Effective URL: https://www.udacity.com/course/intro-to-cybersecurity-nanodegree--nd545?irclickid=SB0XthVbdxyIUZq0CzSaoUE-UkDxnWUgtzM%3A...
Submission: On May 26 via manual from EG — Scanned from DE
Effective URL: https://www.udacity.com/course/intro-to-cybersecurity-nanodegree--nd545?irclickid=SB0XthVbdxyIUZq0CzSaoUE-UkDxnWUgtzM%3A...
Submission: On May 26 via manual from EG — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to content Welcome to Udacity! Claim your personal discount now. Explore programs and use within 7 days. Learn more. Why Udacity?Student Success Schools Artificial IntelligenceAutonomous SystemsBusinessCloud ComputingCybersecurityData ScienceProduct ManagementProgramming & DevelopmentFull Program Catalog POPULAR PROGRAMS 1. Data Engineer 2. Product Manager 3. Blockchain Developer 4. Programming for Data Science with Python 5. Introduction to Programming Sign InGet Started NANODEGREE PROGRAM INTRODUCTION TO CYBERSECURITY Get your start in the high growth field of Cybersecurity by building foundational skills in how to evaluate, maintain, and monitor the security of computer systems. Download Syllabus Enroll Now * 05DAYS * 17HRS * 44MIN * 02SEC * ESTIMATED TIME 4 MONTHS At 10 hours/week * ENROLL BY JUNE 1, 2022 Get access to the classroom immediately on enrollment * PREREQUISITES BASIC KNOWLEDGE OF NETWORK CONNECTIVITY AND OS FUNDAMENTALS See prerequisites in detail IN COLLABORATION WITH: * WHAT YOU WILL LEARN Download Syllabus SYLLABUS INTRODUCTION TO CYBERSECURITY Take your first step toward a career in cybersecurity and learn the skills required to become a security professional with the Introduction to Cybersecurity Nanodegree program. In this program, you will learn how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals. Udacity has teamed up with the best in the field to teach you the basics of security and get you on your way towards an exciting career in the high-growth field of Cybersecurity. Related Nanodegrees Hide details 4 months to complete PREREQUISITE KNOWLEDGE Basic knowledge of network connectivity and OS fundamentals See detailed requirements. * CYBERSECURITY FOUNDATIONS This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems. Securing a Business Network * DEFENDING AND SECURING SYSTEMS Gain exposure to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. You will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. You'll also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit. Monitoring and Securing Douglas Financials Inc. * THREATS, VULNERABILITIES, AND INCIDENT RESPONSE During this course, you will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks. You'll be able to explain the relationship between threats, threat actors, vulnerabilities, and exploits, leverage the MITRE ATT&CK framework to understand attack methods, and distinguish events from incidents and recognize indicators of compromise. Navigating a Cybersecurity Incident * GOVERNANCE, RISK, AND COMPLIANCE Cybersecurity Governance, Risk, and Compliance (GRC) has rapidly become a critical part of an effective cybersecurity strategy. In this course, students will learn about the functions of Governance, Risk, and Compliance and how each function operates alongside operational controls to strengthen an organization’s security. Students will also learn how to assess control effectiveness, measure security risk, and ensure that organizations are meeting security compliance objectives. Create the SwiftTech GRC Program NEED TO PREPARE? We recommend this Linux Command Line Basics course if you'd like to learn more about command-line interface and the Linux systems. The current cybersecurity workforce gap in the U.S. is nearly 500,000 and the global gap is over 4M. ALL OUR PROGRAMS INCLUDE Real-world projects from industry experts With real world projects and immersive content built in partnership with top tier companies, you’ll master the tech skills companies want. Technical mentor support Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you and keeping you on track. Career services You’ll have access to Github portfolio review and LinkedIn profile optimization to help you advance your career and land a high-paying role. Flexible learning program Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you. Program OfferingsFull list of offerings included: Enrollment includes: Class content Real-world projects icon-checkmarkCheckmark Project reviews icon-checkmarkCheckmark Project feedback from experienced reviewers icon-checkmarkCheckmark Student services Technical mentor support NEW icon-checkmarkCheckmark Student community IMPROVED icon-checkmarkCheckmark Career services Github review icon-checkmarkCheckmark Linkedin profile optimization icon-checkmarkCheckmark Succeed with personalized services. We provide services customized for your needs at every step of your learning journey to ensure your success. Experienced Project Reviewers Project Reviewers Technical Mentor Support Technical Mentor Support Get timely feedback on your projects. Reviews By the numbers 1,400+ project reviewers 2.7M projects reviewed 88/100 reviewer rating 1.1 hours avg project review turnaround time Reviewer Services * Personalized feedback * Unlimited submissions and feedback loops * Practical tips and industry best practices * Additional suggested resources to improve Mentors available to answer your questions. Mentors by the numbers 1,400+ technical mentors 0.85 hours median response time Mentorship Services * Support for all your technical questions * Questions answered quickly by our team of technical mentors LEARN WITH THE BEST RON WOERNER Chief Security Officer Ron Woerner, CISSP, CISM is an internationally recognized thought leader in cybersecurity and data privacy. As Chief Security Officer at Cyber-AAA, he works as a consultant/vCISO, advises leaders and delivers training worldwide. He has several technology degrees and is passionate about building cyber professionals. JERRY SMITH Information Security Engineer Jerry is a member of the Security Operations Center for the University of Alabama Birmingham, where he is the lead Threat Hunter and a member of the firewall team. Previously he was an Information Security Engineer for Hibbett Sporting Goods. CHRISTINE IZUAKOR, PHD, CISSP Founder & CEO, Cyber Pop-up Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within Fortune 100 companies and has her PhD in Security Engineering. SEAN PIKE, ESQ., M.S. Sr. Director, Security & GRC Sean Pike is a Cybersecurity and GRC leader with 20+ years of experience leading cybersecurity initiatives in regulated companies. Mr. Pike works with organizations to develop unique, proactive security solutions that follow stringent security principles while accelerating business. INTRODUCTION TO CYBERSECURITY GET STARTED TODAY * MONTHLY ACCESS Pay as you go €359 per month €359/month €359/month Enroll now * Maximum flexibility to learn at your own pace. * Cancel anytime. * 4-MONTH ACCESS Pay upfront and save an extra 13% €1236 €1436 for 4-Month access Enroll now * Save an extra 13% vs. pay as you go. * 4 months is the average time to complete this course. * Switch to monthly price after if more time is needed. * Cancel anytime. Best Value * LEARN Get your start in the high growth field of Cybersecurity by building foundational skills in how to evaluate, maintain, and monitor the security of computer systems. * AVERAGE TIME On average, successful students take 4 months to complete this program. * BENEFITS INCLUDE * Real-world projects from industry experts * Technical mentor support * Career services RELATED NANODEGREE PROGRAMS DATA STRUCTURES AND ALGORITHMS NANODEGREE PROGRAM Get hands-on practice with over 100 data structures and algorithm exercises and technical mentor support when needed to help prepare you for interviews and on-the-job scenarios. Intermediate INTERMEDIATE JAVASCRIPT NANODEGREE PROGRAM Master JavaScript, the most popular programming language in the world. Be equipped for advanced roles in web development, server-side application development, and desktop development. Intermediate PROGRAM OVERVIEW - WHY SHOULD I TAKE THIS PROGRAM? * WHY SHOULD I ENROLL? Cybersecurity is a critically important field for businesses in every industry, especially given the proliferation of data breaches (more than 3.2 million records were compromised in the 10 biggest data breaches in the first half of 2020 alone). To reduce risk and improve security, businesses are rushing to hire for cybersecurity roles, yet there's projected to be 3.5 million unfilled cybersecurity jobs by 2021. The Introduction to Cybersecurity Nanodegree program will equip you with the foundational skills to get started in this highly in-demand field. Graduates of this program will be able to: * Evaluate specific security techniques used to administer a system that meets industry standards and core controls. * Explain methods for establishing and maintaining the security of a network, computing environment, and application. * Apply control techniques to secure networks, operating systems, and applications. * Conduct threat assessments and vulnerability scans to secure the assets of an organization. * WHAT JOBS WILL THIS PROGRAM PREPARE ME FOR? While this is an introductory course that may not necessarily prepare you for a specific job, it will prepare you with the right foundation with which to pursue more specialized cybersecurity training. It also serves as a great supplement for professionals in IT, Risk Management, and Consulting to bolster their current skillset with a strong grasp of cybersecurity fundamentals. * HOW DO I KNOW IF THIS PROGRAM IS RIGHT FOR ME? This program is a great fit for anyone interested in building fundamental skills and knowledge in cybersecurity, such as system and network security, threat assessment, and incident response. Whether you're looking to move into a career in the field of cybersecurity, or just want to improve your own understanding of core cybersecurity skills, the Introduction to Cybersecurity Nanodegree program is for you. ENROLLMENT AND ADMISSION * DO I NEED TO APPLY? WHAT ARE THE ADMISSION CRITERIA? No. This Nanodegree program accepts all applicants regardless of experience and specific background. * WHAT ARE THE PREREQUISITES FOR ENROLLMENT? To be best prepared to succeed in this program, students should have basic familiarity or experience with: * Principles of network connectivity. * Basic operating system fundamentals including Windows or Linux. * IF I DO NOT MEET THE REQUIREMENTS TO ENROLL, WHAT SHOULD I DO? We recommend this Linux Command Line Basics course if you'd like to learn more about the Linux OS. TUITION AND TERM OF PROGRAM * HOW IS THIS NANODEGREE PROGRAM STRUCTURED? The Introduction to Cybersecurity Nanodegree program is comprised of content and curriculum to support four projects. Once you subscribe to a Nanodegree program, you will have access to the content and services for the length of time specified by your subscription. We estimate that students can complete the program in four months, working 10 hours per week. Each project will be reviewed by the Udacity reviewer network. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes. * HOW LONG IS THIS NANODEGREE PROGRAM? You will have access to this Nanodegree program for as long as your subscription remains active. The estimated time to complete this program can be found on the webpage and in the syllabus, and is based on the average amount of time we project that it takes a student to complete the projects and coursework. See the Terms of Use and FAQs for other policies regarding the terms of access to our Nanodegree programs. * CAN I SWITCH MY START DATE? CAN I GET A REFUND? Please see the Udacity Program Terms of Use and FAQs for policies on enrollment in our programs. SOFTWARE AND HARDWARE - WHAT DO I NEED FOR THIS PROGRAM? * WHAT HARDWARE, SOFTWARE, AND VERSIONS WILL I NEED IN THIS PROGRAM? For this Nanodegree program, you will need a desktop or laptop computer running recent versions of Windows, Mac OS X, or Linux and an unmetered broadband Internet connection. Show more WE VALUE YOUR PRIVACY We and our partners use technology such as cookies on our site to personalize content and ads, provide social media features, and analyze our traffic. Click “I accept” to consent to the use of this technology on our site. Click “More Options” for more information on how we use cookies. You can change your mind and change your consent choices at any time by returning to this site. I AcceptMore OptionsOur Privacy Policy * FEATURED PROGRAMS * Business Analytics * SQL * Data Engineer * Data Analyst * Intro to Programming * Digital Marketing * Self Driving Car Engineer * ONLY AT UDACITY * Artificial Intelligence * Deep Learning * Digital Marketing * Flying Car and Autonomous Flight Engineer * Intro to Self-Driving Cars * Machine Learning Engineer * Robotics Software Engineer * UDACITY SCHOOLS * School of Artificial Intelligence * School of Autonomous Systems * School of Business * School of Cloud Computing * School of Cybersecurity * School of Data Science * School of Programming * School of Product Management * ENTERPRISE * Udacity for Enterprise * Digital Transformation with Udacity * Artificial Intelligence for Enterprise * Cybersecurity for Enterprise * Data Science for Enterprise * Udacity for Financial Services * Corporate Social Responsibility * Train-to-Hire * Enterprise Resource Center GOVERNMENT * Udacity for Government INDIVIDUALS * Udacity for Individuals * RESOURCES * Catalog * Career Services * Student Success * Udacity Talks * Scholarships * What is AI? * COMPANY * About * Blog * In the News * Jobs at Udacity * Partners * Affiliates * Become an Instructor * SUPPORT * Contact Us * Help and FAQ * Service Status * Tech Requirements * * * * * "Nanodegree" is a registered trademark of Udacity. © 2011–2022 Udacity, Inc. Udacity is not an accredited university and we don't confer traditional degrees. Udacity Nanodegree programs represent collaborations with our industry partners who help us develop our content and who hire many of our program graduates. * © 2011–2022 Udacity, Inc. * Legal & Privacy * Site Map