Udacity part of Accenture logo

Network and Enterprise Security

Transform your cybersecurity expertise with these comprehensive enterprise security courses and programs. Explore network architecture, endpoint defense, and secure software design to master the tools, frameworks, and strategies that protect enterprise ecosystems from digital threats.

Browse Network and Enterprise Security Courses

Infrastructure and Network Security Architecture Planning and Design

Design and implement robust network security architectures. Learn to plan, analyze, and build intelligence-driven defenses using industry frameworks like TOGAF and Zachman to protect enterprise systems from evolving cyber threats.

View Course

Security Engineering Fundamentals

Explore how to apply security principles, cryptographic methods, and risk evaluation frameworks to design, assess, and audit resilient systems that protect organizational data and operations.

View Course

Enterprise Security

The Enterprise Security Nanodegree program equips learners with practical skills in network, endpoint, and application security. Design enterprise defenses, manage data integrity, and apply zero-trust strategies to strengthen organizational security.

View Course

Enterprise Perimeter and Network Security

Refine your network security expertise by designing scalable architectures in Azure. Apply Zero Trust principles and configure SIEM monitoring to strengthen enterprise defenses and detect vulnerabilities proactively.

View Course

Enterprise Endpoint Security

In this course, you will learn about how to craft Enterprise level Endpoint security policies and hardening strategies.

View Course

Security Architect

This Nanodegree equips you with the advanced skills to design, build, and manage secure enterprise systems, covering identity management, infrastructure protection, and incident response to architect resilient defenses.

View Course

Enterprise-Wide Application Security

Application security is a critical part of any enterprise security plan. We will be cover how to perform a threat assessment by doing threat modeling and pen testing. This course will teach mitigation and defensive strategies in an application software development lifecycle. The focus will be on covering how enterprises bake security into their lifecycle by shifting security left and the different ways they enhance their security posture across on-premise, cloud, containers, and APIs.

View Course

Complementary Course Collections

Broaden your cybersecurity and technical foundation with these related learning paths that complement your network and enterprise security training. With these courses, you can strengthen your expertise across digital defense, ethical hacking, and data-driven system design.

Cybersecurity

Take your cybersecurity foundation further with specialized skills that expand both depth and versatility. Learn to think like an attacker through ethical hacking, apply Python to streamline defense and analytics, and gain the knowledge to secure embedded systems that drive innovation across industries.

View Course Collection

Ethical Hacking

Expand your learning beyond ethical hacking with these complementary courses. Whether you want to deepen your cybersecurity foundation, strengthen your data engineering skills, or build multi-cloud fluency, these courses provide the cross-functional expertise needed to support advanced security and enterprise goals.

View Course Collection

Algorithm and Data Architecture

Advance your expertise beyond algorithms and data architecture with complementary courses in programming, analytics, and JavaScript. Strengthen your technical foundation, master data storytelling, and build data-driven applications that connect strong system design with modern development.

View Course Collection

Browse the Full Course Catalog

View Course Catalog
Udacity Accenture logo

Company

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

© 2011-2026 Udacity, Inc. "Nanodegree" is a registered trademark of Udacity. © 2011-2026 Udacity, Inc.
We use cookies and other data collection technologies to provide the best experience for our customers.