YoVDO

Fundamentals of Defending Systems

Offered By: Udacity

Tags

Information Security (InfoSec) Courses Cybersecurity Courses Network Security Courses Network Architecture Courses Security Analysis Courses Threat Modeling Courses

Course Description

Overview

In this course, you will begin your exploration into the role of a security analyst. You will learn about the core principles and philosophies that drive work in the security field. Then, you will discover physical, logical, and administrative controls, their industry-recognized frameworks, and how to apply them to secure a network, system, or application. Lastly, you will apply security concepts to create defensible, resilient network architecture.

Syllabus

  • Introduction to the Analyst Role
    • This lesson is an introduction to the Security Analyst role and how that role fits into an organization.
  • Core Frameworks and Principles
    • This lesson provides the underlying philosophy and objectives for your work as an Analyst. Through real examples, you'll explore a variety of attack vectors and threat modeling strategies.
  • Controls
    • This lesson is a broad survey of the families of security controls and provides opportunities to work with some of the technical mechanisms used to prevent security challenges.
  • Defensible Network Architecture
    • This lesson focuses on improving your organization's posture by applying control concepts to design infrastructure that is more resistant to intrusion.
  • Project - Planning for Security Controls
    • For your final project, you will assume the role of an Information Security Analyst for an industrial manufacturing company located in the Midwest Unites States.

Taught by

Richard Phung

Related Courses

Information Security and Risk Management in Context
University of Washington via Coursera
Designing and Executing Information Security Strategies
University of Washington via Coursera
Intro to Information Security
Georgia Institute of Technology via Udacity
Information Security and Risk Management: An Overview
University of Washington via Canvas Network
Information Security- II
Indian Institute of Technology Madras via Swayam