YoVDO

Introduction to Cybersecurity

Offered By: SecurityScoreCard via Udacity

Tags

Cybersecurity Courses Network Security Courses Risk Management Courses Incident Response Courses Data Encryption Courses Vulnerability Management Courses Security Compliance Courses Defense in Depth Courses

Course Description

Overview

In this program, you will learn how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals.

Syllabus

  • Welcome to the Nanodegree Program
  • Cybersecurity Foundations
    • Security is embedded in all we do online and is a critical job skill and career field. This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.
  • Defending and Securing Systems
    • In this course, students will be exposed to a diverse group of technologies that will provide or enhance the
      skills needed to enter the cybersecurity field. Students will apply best practices of Defense in Depth to secure
      computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. Students will also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.
  • Threats, Vulnerabilities, and Incident Response
    • Cybersecurity breaches happen when a threat is able to successfully exploit a vulnerability within a business. To avoid these attacks, security professionals must understand the threats the company is facing, including the various threat actors and their motivations. Security professionals must also be able to find vulnerabilities that can enable threats to attack through common practices such as vulnerability scanning and penetration testing. Finally, security professionals should be able to activate and follow incident response procedures to address cybersecurity incidents and breaches. Ultimately, during this course, students will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks.
  • Governance, Risk, and Compliance
    • This course provides an overview of governance, risk, and compliance. It focuses on the importance of GRC, identifying GRC concerns, and ways to mitigate those concerns.
  • Congratulations!
    • Congratulations on finishing your program!
  • Career Services
    • The Careers team at Udacity is here to help you move forward in your career - whether it's finding a new job, exploring a new career path, or applying new skills to your current job.

Taught by

Ron Woerner, CISSP, CISM, Jerry Smith, Christine Izuakor, PhD, CISSP and Sean Pike, Esq., M.S.

Related Courses

Academia de auditoría en la nube: independencia en la nube (Español LATAM) | Cloud Audit Academy - Cloud Agnostic (Spanish from Latin America)
Amazon Web Services via AWS Skill Builder
AWS Certified DevOps Engineer – Professional
A Cloud Guru
AWS Certified DevOps Engineer - Professional 2020
A Cloud Guru
CompTIA CySA+ Certification
A Cloud Guru
Advanced Network Security
LearnQuest via Coursera