www.udacity.com Open in urlscan Pro
2606:4700::6812:a74  Public Scan

Submitted URL: https://imp.i115008.net/Ry1X7X
Effective URL: https://www.udacity.com/course/intro-to-cybersecurity-nanodegree--nd545?irclickid=SB0XthVbdxyIUZq0CzSaoUE-UkDxnWUgtzM%3A...
Submission: On May 26 via manual from EG — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Skip to content

Welcome to Udacity! Claim your personal discount now. Explore programs and use
within 7 days. Learn more.


Why Udacity?Student Success
Schools
Artificial IntelligenceAutonomous SystemsBusinessCloud
ComputingCybersecurityData ScienceProduct ManagementProgramming &
DevelopmentFull Program Catalog


POPULAR PROGRAMS

 1. Data Engineer
 2. Product Manager
 3. Blockchain Developer
 4. Programming for Data Science with Python
 5. Introduction to Programming

Sign InGet Started

NANODEGREE PROGRAM


INTRODUCTION TO CYBERSECURITY

Get your start in the high growth field of Cybersecurity by building
foundational skills in how to evaluate, maintain, and monitor the security of
computer systems.
Download Syllabus
Enroll Now
 * 05DAYS
 * 17HRS
 * 44MIN
 * 02SEC



 * ESTIMATED TIME
   
   4 MONTHS
   
   At 10 hours/week

 * ENROLL BY
   
   JUNE 1, 2022
   
   Get access to the classroom immediately on enrollment

 * PREREQUISITES
   
   BASIC KNOWLEDGE OF NETWORK CONNECTIVITY AND OS FUNDAMENTALS
   
   See prerequisites in detail

IN COLLABORATION WITH:

 * 

WHAT YOU WILL LEARN

Download Syllabus

SYLLABUS


INTRODUCTION TO CYBERSECURITY

Take your first step toward a career in cybersecurity and learn the skills
required to become a security professional with the Introduction to
Cybersecurity Nanodegree program. In this program, you will learn how to
evaluate, maintain, and monitor the security of computer systems. You’ll also
learn how to assess threats, respond to incidents, and implement security
controls to reduce risk and meet security compliance goals.

Udacity has teamed up with the best in the field to teach you the basics of
security and get you on your way towards an exciting career in the high-growth
field of Cybersecurity.

Related Nanodegrees
Hide details

4 months to complete

PREREQUISITE KNOWLEDGE

Basic knowledge of network connectivity and OS fundamentals See detailed
requirements.

 * CYBERSECURITY FOUNDATIONS
   
   This foundations course explains security fundamentals including core
   principles, critical security controls, and cybersecurity best practices.
   Students will also evaluate specific security techniques used to administer a
   system that meets industry standards and core controls, assess high-level
   risks, vulnerabilities, and attack vectors of a sample system, and explain
   ways to establish and maintain the security of different types of computer
   systems.
   
   Securing a Business Network

 * DEFENDING AND SECURING SYSTEMS
   
   Gain exposure to a diverse group of technologies that will provide or enhance
   the skills needed to enter the cybersecurity field. You will apply best
   practices of Defense in Depth to secure computer systems, use outputs from
   security incidents to analyze and improve future network security, and search
   internal systems to determine network vulnerabilities. You'll also learn how
   to recommend mitigations to address common application vulnerabilities and
   ensure fundamental encryption techniques for securing data at rest and in
   transit.
   
   Monitoring and Securing Douglas Financials Inc.

 * THREATS, VULNERABILITIES, AND INCIDENT RESPONSE
   
   During this course, you will learn how to identify security threats and gaps,
   fix issues, and respond to inevitable attacks. You'll be able to explain the
   relationship between threats, threat actors, vulnerabilities, and exploits,
   leverage the MITRE ATT&CK framework to understand attack methods, and
   distinguish events from incidents and recognize indicators of compromise.
   
   Navigating a Cybersecurity Incident

 * GOVERNANCE, RISK, AND COMPLIANCE
   
   Cybersecurity Governance, Risk, and Compliance (GRC) has rapidly become a
   critical part of an effective cybersecurity strategy. In this course,
   students will learn about the functions of Governance, Risk, and Compliance
   and how each function operates alongside operational controls to strengthen
   an organization’s security. Students will also learn how to assess control
   effectiveness, measure security risk, and ensure that organizations are
   meeting security compliance objectives.
   
   Create the SwiftTech GRC Program

NEED TO PREPARE?

We recommend this Linux Command Line Basics course if you'd like to learn more
about command-line interface and the Linux systems.
The current cybersecurity workforce gap in the U.S. is nearly 500,000 and the
global gap is over 4M.


ALL OUR PROGRAMS INCLUDE



Real-world projects from industry experts

With real world projects and immersive content built in partnership with top
tier companies, you’ll master the tech skills companies want.

Technical mentor support

Our knowledgeable mentors guide your learning and are focused on answering your
questions, motivating you and keeping you on track.

Career services

You’ll have access to Github portfolio review and LinkedIn profile optimization
to help you advance your career and land a high-paying role.

Flexible learning program

Tailor a learning plan that fits your busy life. Learn at your own pace and
reach your personal goals on the schedule that works best for you.
Program OfferingsFull list of offerings included:

Enrollment includes:
Class content
Real-world projects

icon-checkmarkCheckmark
Project reviews

icon-checkmarkCheckmark
Project feedback from experienced reviewers

icon-checkmarkCheckmark
Student services
Technical mentor support

NEW


icon-checkmarkCheckmark
Student community

IMPROVED


icon-checkmarkCheckmark
Career services
Github review

icon-checkmarkCheckmark
Linkedin profile optimization

icon-checkmarkCheckmark
Succeed with personalized services.
We provide services customized for your needs at every step of your learning
journey to ensure your success.
Experienced Project Reviewers
Project Reviewers
Technical Mentor Support
Technical Mentor Support
Get timely feedback on your projects.
Reviews By the numbers
1,400+ project reviewers
2.7M projects reviewed
88/100 reviewer rating
1.1 hours avg project review turnaround time
Reviewer Services
 * Personalized feedback
 * Unlimited submissions and feedback loops
 * Practical tips and industry best practices
 * Additional suggested resources to improve

Mentors available to answer your questions.
Mentors by the numbers
1,400+ technical mentors
0.85 hours median response time
Mentorship Services
 * Support for all your technical questions
 * Questions answered quickly by our team of technical mentors


LEARN WITH THE BEST

RON WOERNER

Chief Security Officer

Ron Woerner, CISSP, CISM is an internationally recognized thought leader in
cybersecurity and data privacy. As Chief Security Officer at Cyber-AAA, he works
as a consultant/vCISO, advises leaders and delivers training worldwide. He has
several technology degrees and is passionate about building cyber professionals.

JERRY SMITH

Information Security Engineer

Jerry is a member of the Security Operations Center for the University of
Alabama Birmingham, where he is the lead Threat Hunter and a member of the
firewall team. Previously he was an Information Security Engineer for Hibbett
Sporting Goods.

CHRISTINE IZUAKOR, PHD, CISSP

Founder & CEO, Cyber Pop-up

Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity
platform powered by vetted cyber freelancers. She has over a decade of
experience leading cybersecurity functions within Fortune 100 companies and has
her PhD in Security Engineering.

SEAN PIKE, ESQ., M.S.

Sr. Director, Security & GRC

Sean Pike is a Cybersecurity and GRC leader with 20+ years of experience leading
cybersecurity initiatives in regulated companies. Mr. Pike works with
organizations to develop unique, proactive security solutions that follow
stringent security principles while accelerating business.




INTRODUCTION TO CYBERSECURITY


GET STARTED TODAY


 * MONTHLY ACCESS
   
   Pay as you go
   
   €359
   per month
   
   €359/month
   
   €359/month
   
   Enroll now
    * Maximum flexibility to learn at your own pace.
    * Cancel anytime.


 * 4-MONTH ACCESS
   
   Pay upfront and save an extra 13%
   
   €1236 €1436
   for 4-Month access
   
   Enroll now
    * Save an extra 13% vs. pay as you go.
    * 4 months is the average time to complete this course.
    * Switch to monthly price after if more time is needed.
    * Cancel anytime.
   
   Best Value


 * LEARN
   
   Get your start in the high growth field of Cybersecurity by building
   foundational skills in how to evaluate, maintain, and monitor the security of
   computer systems.


 * AVERAGE TIME
   
   On average, successful students take 4 months to complete this program.


 * BENEFITS INCLUDE
   
    * Real-world projects from industry experts
    * Technical mentor support
    * Career services

RELATED NANODEGREE PROGRAMS


DATA STRUCTURES AND ALGORITHMS

NANODEGREE PROGRAM

Get hands-on practice with over 100 data structures and algorithm exercises and
technical mentor support when needed to help prepare you for interviews and
on-the-job scenarios.

Intermediate




INTERMEDIATE JAVASCRIPT

NANODEGREE PROGRAM

Master JavaScript, the most popular programming language in the world. Be
equipped for advanced roles in web development, server-side application
development, and desktop development.

Intermediate



PROGRAM OVERVIEW - WHY SHOULD I TAKE THIS PROGRAM?

 * WHY SHOULD I ENROLL?
   
   Cybersecurity is a critically important field for businesses in every
   industry, especially given the proliferation of data breaches (more than 3.2
   million records were compromised in the 10 biggest data breaches in the first
   half of 2020 alone). To reduce risk and improve security, businesses are
   rushing to hire for cybersecurity roles, yet there's projected to be 3.5
   million unfilled cybersecurity jobs by 2021. The Introduction to
   Cybersecurity Nanodegree program will equip you with the foundational skills
   to get started in this highly in-demand field.
   
   Graduates of this program will be able to:
    * Evaluate specific security techniques used to administer a system that
      meets industry standards and core controls.
    * Explain methods for establishing and maintaining the security of a
      network, computing environment, and application.
    * Apply control techniques to secure networks, operating systems, and
      applications.
    * Conduct threat assessments and vulnerability scans to secure the assets of
      an organization.

 * WHAT JOBS WILL THIS PROGRAM PREPARE ME FOR?
   
   While this is an introductory course that may not necessarily prepare you for
   a specific job, it will prepare you with the right foundation with which to
   pursue more specialized cybersecurity training. It also serves as a great
   supplement for professionals in IT, Risk Management, and Consulting to
   bolster their current skillset with a strong grasp of cybersecurity
   fundamentals.

 * HOW DO I KNOW IF THIS PROGRAM IS RIGHT FOR ME?
   
   This program is a great fit for anyone interested in building fundamental
   skills and knowledge in cybersecurity, such as system and network security,
   threat assessment, and incident response. Whether you're looking to move into
   a career in the field of cybersecurity, or just want to improve your own
   understanding of core cybersecurity skills, the Introduction to Cybersecurity
   Nanodegree program is for you.

ENROLLMENT AND ADMISSION

 * DO I NEED TO APPLY? WHAT ARE THE ADMISSION CRITERIA?
   
   No. This Nanodegree program accepts all applicants regardless of experience
   and specific background.

 * WHAT ARE THE PREREQUISITES FOR ENROLLMENT?
   
   To be best prepared to succeed in this program, students should have basic
   familiarity or experience with:
    * Principles of network connectivity.
    * Basic operating system fundamentals including Windows or Linux.

 * IF I DO NOT MEET THE REQUIREMENTS TO ENROLL, WHAT SHOULD I DO?
   
   We recommend this Linux Command Line Basics course if you'd like to learn
   more about the Linux OS.

TUITION AND TERM OF PROGRAM

 * HOW IS THIS NANODEGREE PROGRAM STRUCTURED?
   
   The Introduction to Cybersecurity Nanodegree program is comprised of content
   and curriculum to support four projects. Once you subscribe to a Nanodegree
   program, you will have access to the content and services for the length of
   time specified by your subscription. We estimate that students can complete
   the program in four months, working 10 hours per week.
   
   Each project will be reviewed by the Udacity reviewer network. Feedback will
   be provided and if you do not pass the project, you will be asked to resubmit
   the project until it passes.

 * HOW LONG IS THIS NANODEGREE PROGRAM?
   
   You will have access to this Nanodegree program for as long as your
   subscription remains active. The estimated time to complete this program can
   be found on the webpage and in the syllabus, and is based on the average
   amount of time we project that it takes a student to complete the projects
   and coursework. See the Terms of Use and FAQs for other policies regarding
   the terms of access to our Nanodegree programs.

 * CAN I SWITCH MY START DATE? CAN I GET A REFUND?
   
   Please see the Udacity Program Terms of Use and FAQs for policies on
   enrollment in our programs.

SOFTWARE AND HARDWARE - WHAT DO I NEED FOR THIS PROGRAM?

 * WHAT HARDWARE, SOFTWARE, AND VERSIONS WILL I NEED IN THIS PROGRAM?
   
   For this Nanodegree program, you will need a desktop or laptop computer
   running recent versions of Windows, Mac OS X, or Linux and an unmetered
   broadband Internet connection.

Show more


WE VALUE YOUR PRIVACY

We and our partners use technology such as cookies on our site to personalize
content and ads, provide social media features, and analyze our traffic. Click
“I accept” to consent to the use of this technology on our site. Click “More
Options” for more information on how we use cookies. You can change your mind
and change your consent choices at any time by returning to this site.

I AcceptMore OptionsOur Privacy Policy



 * FEATURED PROGRAMS
   
    * Business Analytics
    * SQL
    * Data Engineer
    * Data Analyst
    * Intro to Programming
    * Digital Marketing
    * Self Driving Car Engineer


 * ONLY AT UDACITY
   
    * Artificial Intelligence
    * Deep Learning
    * Digital Marketing
    * Flying Car and Autonomous Flight Engineer
    * Intro to Self-Driving Cars
    * Machine Learning Engineer
    * Robotics Software Engineer
    *  
   
   
   UDACITY SCHOOLS
   
    * School of Artificial Intelligence
    * School of Autonomous Systems
    * School of Business
    * School of Cloud Computing
    * School of Cybersecurity
    * School of Data Science
    * School of Programming
    * School of Product Management


 * ENTERPRISE
   
    * Udacity for Enterprise
    * Digital Transformation with Udacity
    * Artificial Intelligence for Enterprise
    * Cybersecurity for Enterprise
    * Data Science for Enterprise
    * Udacity for Financial Services
    * Corporate Social Responsibility
    * Train-to-Hire
    * Enterprise Resource Center
   
   
   GOVERNMENT
   
    * Udacity for Government
   
   
   INDIVIDUALS
   
    * Udacity for Individuals


 * RESOURCES
   
    * Catalog
    * Career Services
    * Student Success
    * Udacity Talks
    * Scholarships
    * What is AI?
    *  
   
   
   COMPANY
   
    * About
    * Blog
    * In the News
    * Jobs at Udacity
    * Partners
    * Affiliates
    * Become an Instructor


 * SUPPORT
   
    * Contact Us
    * Help and FAQ
    * Service Status
    * Tech Requirements
    * * 
      * 
      * 
      * 

"Nanodegree" is a registered trademark of Udacity. © 2011–2022 Udacity, Inc.

Udacity is not an accredited university and we don't confer traditional degrees.
Udacity Nanodegree programs represent collaborations with our industry partners
who help us develop our content and who hire many of our program graduates.

 * © 2011–2022 Udacity, Inc.

 * Legal & Privacy
 * Site Map