Udacity part of Accenture logo

Threat and Risk Management

Deepen your cybersecurity knowledge and hands-on skills with this curated course collection. Designed for analysts, engineers, and security professionals, it covers threat analysis, vulnerability management, incident response, system monitoring, and resilient cloud infrastructure.

Browse Threat and Risk Management Courses

Analyzing Security Threats

Refine your ability to identify and mitigate security risks. Study the cyber landscape, mitigate OWASP Top 10 risks, and create actionable threat models to protect organizations from critical security challenges.

View Course

Assessing Vulnerabilities and Reducing Risk

In this course, you will learn how security analysts address system vulnerabilities in order to reduce organizational risk. You will first learn about vulnerabilities, their characteristics, as well as their dynamic lifecycle. You will then explore the ways analysts assess vulnerabilities, including reviewing and administering scanning tools and utilities. You will learn how to measure the risks associated with discovered vulnerabilities. Lastly, you will review ways to communicate risk in order to plan remediation and mitigation activities.

View Course

Threats, Vulnerabilities, and Incident Response

Build the expertise to handle real-world cyber incidents. Identify threats, analyze vulnerabilities, and apply structured response procedures to minimize damage and recover quickly from security breaches.

View Course

Security Analyst

Step into the world of cybersecurity. This Nanodegree equips you with the practical skills and strategic know-how to tackle threats, assess vulnerabilities, and defend complex systems effectively.

View Course

Monitoring, Logging and Responding to Incidents

Monitor and analyze cybersecurity incidents using Snort, Wireshark, tcpdump, and Splunk. Implement logging, detection, and remediation processes to protect networks and maintain resilient digital systems.

View Course

Planning for High Availability and Incident Response

In this course, we will look at how SREs view availability and reliability for their infrastructure. We'll learn how to create effective monitoring using SLOs and SLIs. We will create dashboards in Grafana. Next, we'll identify all our IT assets, ensure they are configured for high availability. And then we will craft a disaster recovery plan to make sure failover is seamless and automated. After that, we'll deploy the infrastructure to AWS using Terraform. We'll learn the benefits of infrastructure as code. We'll see how easy it is to deploy to multiple regions. Finally, we'll learn how to make databases highly available and disaster recovery ready. We'll look at recovery strategies and implement them in AWS via Terraform.

View Course

Complementary Course Collections

Threat and risk management demands sharp analytical skills and strategic thinking. You can further hone these skills and your cybersecurity expertise with these complementary courses covering systems security, network defenses, and data protection to prepare for careers across diverse security roles.

Identity Access Management and Data Privacy

Mastering identity, access, and data protection creates a strong foundation for advancing into broader cybersecurity domains. These courses connect seamlessly with enterprise security, ethical hacking, and network defense skills, enabling you to build, manage, and protect complex systems with confidence and precision.

View Course Collection

Network and Enterprise Security

Broaden your cybersecurity and technical foundation with these related learning paths that complement your network and enterprise security training. With these courses, you can strengthen your expertise across digital defense, ethical hacking, and data-driven system design.

View Course Collection

Security Engineering and Architecture

With core security engineering and architecture skills in place, these additional courses guide you into broader areas such as enterprise network protection, autonomous control, and responsible data governance. The result is a more complete skill set for securing systems and safeguarding the data that supports them.

View Course Collection

Browse the Full School Library

Explore all of Udacity’s Schools, consisting of hundreds of career-driven programs and courses that are designed to teach practical skills and help you learn to your full potential.

Browse Schools
Udacity Accenture logo

Company

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

© 2011-2026 Udacity, Inc. "Nanodegree" is a registered trademark of Udacity. © 2011-2026 Udacity, Inc.
We use cookies and other data collection technologies to provide the best experience for our customers.