YoVDO

Defending and Securing Systems

Offered By: Udacity

Tags

Information Security (InfoSec) Courses Cybersecurity Courses Cryptography Courses Network Security Courses Data Encryption Courses Defense in Depth Courses

Course Description

Overview

In this course, students will be exposed to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. Students will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. Students will also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.

Syllabus

  • Introduction to Defending and Securing Systems
    • Course introduction to Introduction to Defending and Securing Systems
  • Defending Computer Systems and Security Principles
    • In this lesson you will learn about best practices in defending computer systems.
  • System Security: Securing Networks
    • In this lesson you will learn how to secure networks.
  • Monitoring and Logging for Detection of Malicious Activity
    • In this lesson, you'll learn how to effectively monitor and use logs to detect malicious activity.
  • Cryptography Basics (Applied Cryptography)
    • In this lesson, you will learn the basics of cryptography and how to use tools to encrypt files.
  • Monitoring and Securing the DFI Environment
    • This lesson is the project lesson for Defending and Securing Systems course.

Taught by

Jerry Smith

Related Courses

Introduction to Cybersecurity
SecurityScoreCard via Udacity
CSSLP Cert Prep: 1 Secure Software Concepts
LinkedIn Learning
Microsoft Azure: Management and Security Essentials
LinkedIn Learning
Architecting for Security on AWS
Pluralsight
AWS Lambda Function Security & Defense in Depth
Amazon Web Services via AWS Skill Builder